DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
WHO’S IN THE MIDDLE?

WHO’S IN THE MIDDLE?

4
Comments
5 min read
Welcome to my Dev profil đź‘‹

Welcome to my Dev profil đź‘‹

Comments
1 min read
Step-by-Step Tutorial for Lynis on Kali Linux: Installation and Management

Step-by-Step Tutorial for Lynis on Kali Linux: Installation and Management

1
Comments
7 min read
Top 10 Cybersecurity Blog Posts That Made April 2025 a Breakthrough Month for OpenExploit

Top 10 Cybersecurity Blog Posts That Made April 2025 a Breakthrough Month for OpenExploit

Comments
4 min read
Cybersecurity for Small Businesses: A Complete Guide

Cybersecurity for Small Businesses: A Complete Guide

Comments 2
4 min read
Quantum Computing and the Future of Cryptography

Quantum Computing and the Future of Cryptography

Comments
7 min read
When Servers Talk to Strangers: SSRF

When Servers Talk to Strangers: SSRF

4
Comments
4 min read
6 Threat Actors Targeting Face Authentication in 2FA / MFA

6 Threat Actors Targeting Face Authentication in 2FA / MFA

16
Comments
3 min read
What If Your App Becomes a Tool for Scammers?

What If Your App Becomes a Tool for Scammers?

Comments
9 min read
⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

Comments
3 min read
GitHub Sponsors: Navigating Privacy and Security

GitHub Sponsors: Navigating Privacy and Security

Comments
8 min read
Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Comments
5 min read
Understanding Session Hijacking: Detection, Prevention, and Mitigation

Understanding Session Hijacking: Detection, Prevention, and Mitigation

Comments
6 min read
Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Comments
7 min read
What is a Denial of Service (DoS) Attack? A Comprehensive Guide

What is a Denial of Service (DoS) Attack? A Comprehensive Guide

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.