DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
6 AI Models vs. 3 Advanced Security Vulnerabilities

6 AI Models vs. 3 Advanced Security Vulnerabilities

Comments
9 min read
Hacking in Movies vs. Reality

Hacking in Movies vs. Reality

Comments
3 min read
The Problem With WhatsApp’s “Privacy Promise"

The Problem With WhatsApp’s “Privacy Promise"

Comments
4 min read
Why “Hackers Are Criminals” Is an Outdated View

Why “Hackers Are Criminals” Is an Outdated View

Comments
3 min read
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know

10
Comments
2 min read
⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%

⚡Building a Scalable Authentication Layer That Cuts Development Time by 60%

9
Comments
1 min read
Discover The SSL/TLS Security Analyzer API

Discover The SSL/TLS Security Analyzer API

Comments
2 min read
Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

2
Comments
4 min read
Secure Your APIs with Apache APISIX + SafeLine WAF

Secure Your APIs with Apache APISIX + SafeLine WAF

6
Comments
2 min read
Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

1
Comments
2 min read
FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense

Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense

4
Comments
3 min read
Building AI Systems That Don't Break Under Attack

Building AI Systems That Don't Break Under Attack

1
Comments
7 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

1
Comments
4 min read
Security Alert: XXE Vulnerability in Weaver e-cology OA

Security Alert: XXE Vulnerability in Weaver e-cology OA

6
Comments
2 min read
Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

1
Comments
3 min read
Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Comments
3 min read
Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

1
Comments
3 min read
Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

10
Comments
3 min read
The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

1
Comments
4 min read
Open-source project FlareProx presented — a Cloudflare proxy for web scraping and pentesting

Open-source project FlareProx presented — a Cloudflare proxy for web scraping and pentesting

Comments 1
2 min read
Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

2
Comments
3 min read
loading...