DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

Comments
6 min read
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

4
Comments
2 min read
Cloud Ransomware: Targeting Web Applications in 2024

Cloud Ransomware: Targeting Web Applications in 2024

2
Comments 4
2 min read
DevSecOps?

DevSecOps?

5
Comments
3 min read
Top 10 SBOM Tools to Inventory Your App Components

Top 10 SBOM Tools to Inventory Your App Components

Comments
7 min read
Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

5
Comments 1
3 min read
Part 7: SQL Injection Series: Advanced SQL Injection Techniques

Part 7: SQL Injection Series: Advanced SQL Injection Techniques

5
Comments 1
4 min read
AI-Driven Election Security: Safeguarding Democracy in the Digital Age

AI-Driven Election Security: Safeguarding Democracy in the Digital Age

10
Comments
5 min read
Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

9
Comments
3 min read
Call, Send, and Transfer: The Payment gateway for Web3

Call, Send, and Transfer: The Payment gateway for Web3

5
Comments
2 min read
Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Comments
5 min read
Understanding of Pulling WAF Definitions Updates

Understanding of Pulling WAF Definitions Updates

5
Comments
3 min read
How to Detect and Defend Against SQL Injection Attacks - Part 2

How to Detect and Defend Against SQL Injection Attacks - Part 2

7
Comments 1
4 min read
The Evolution of Cybersecurity in the Age of AI💡

The Evolution of Cybersecurity in the Age of AI💡

Comments
2 min read
What's New in Open Source WAF, SafeLine V7.2.3?

What's New in Open Source WAF, SafeLine V7.2.3?

5
Comments
1 min read
AI for Mental Health and Therapy: Revolutionizing Mental Health Care

AI for Mental Health and Therapy: Revolutionizing Mental Health Care

10
Comments
6 min read
How AI Is Transforming IAM and Identity Security

How AI Is Transforming IAM and Identity Security

2
Comments
3 min read
What is an Upstream Server

What is an Upstream Server

8
Comments 1
3 min read
OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
Upgrading Simple Shells to Fully Interactive TTYs

Upgrading Simple Shells to Fully Interactive TTYs

1
Comments
2 min read
Who Are Anonymous Users ?🎭

Who Are Anonymous Users ?🎭

4
Comments
4 min read
Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Comments
2 min read
AI Cybersecurity Challenges: Navigating Emerging Threats and Opportunities

AI Cybersecurity Challenges: Navigating Emerging Threats and Opportunities

10
Comments
6 min read
Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

Comments
5 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
loading...