DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When a seemingly innoffensive conversation with AI turns malicious

When a seemingly innoffensive conversation with AI turns malicious

Comments
2 min read
SafeLine WAF Builds a Unified Identity Authentication Hub

SafeLine WAF Builds a Unified Identity Authentication Hub

Comments
2 min read
What Is My IP Address?

What Is My IP Address?

2
Comments
7 min read
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Comments
1 min read
My First Step Into Cybersecurity

My First Step Into Cybersecurity

Comments
1 min read
🔐 Exploring Wi‑Fi Security Safely: A Beginner‑Friendly Guide to the WiFi‑Lab Controller (with GUI!)

🔐 Exploring Wi‑Fi Security Safely: A Beginner‑Friendly Guide to the WiFi‑Lab Controller (with GUI!)

5
Comments 1
4 min read
Everyone Talks About Clean Architecture — No One Fixes the Data Layer

Everyone Talks About Clean Architecture — No One Fixes the Data Layer

Comments
1 min read
A Self-Hosted Alternative to Cloudflare

A Self-Hosted Alternative to Cloudflare

6
Comments
3 min read
DNS: The Application Layer That Translates the Internet

DNS: The Application Layer That Translates the Internet

Comments
8 min read
📚 An In-Depth Guide to Modern Cryptography and Web Security

📚 An In-Depth Guide to Modern Cryptography and Web Security

Comments
5 min read
React2Shell: A Deep Dive into Critical React Server Components Vulnerabilities (Late 2025)

React2Shell: A Deep Dive into Critical React Server Components Vulnerabilities (Late 2025)

7
Comments
3 min read
Non-functional Application Requirements: Compliance

Non-functional Application Requirements: Compliance

1
Comments
13 min read
Weekend Project- Building a Serverless Phishing Detector for Google's Cloud Run Hackathon

Weekend Project- Building a Serverless Phishing Detector for Google's Cloud Run Hackathon

Comments
3 min read
Feistel Cipher: The Architectural Marvel Behind Modern Cryptography

Feistel Cipher: The Architectural Marvel Behind Modern Cryptography

Comments
1 min read
Best Beginner’s Guide For Cybersecurity Recon with Python

Best Beginner’s Guide For Cybersecurity Recon with Python

5
Comments
8 min read
"Apple Music" Sent a Renewal Email to my Android…

"Apple Music" Sent a Renewal Email to my Android…

Comments
4 min read
🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

7
Comments
3 min read
Flutter Dev + AppSec Engineer Built a KRA PIN Checker That Stores ZERO User Data (And Still Makes Money with M-Pesa Tokens) 🛡️🇰🇪

Flutter Dev + AppSec Engineer Built a KRA PIN Checker That Stores ZERO User Data (And Still Makes Money with M-Pesa Tokens) 🛡️🇰🇪

Comments
3 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

5
Comments
4 min read
How to Push Your Code from Visual Studio (Local) to GitHub Using Git the Terminal.[Beginner's Guide]

How to Push Your Code from Visual Studio (Local) to GitHub Using Git the Terminal.[Beginner's Guide]

1
Comments
3 min read
OWASP Top 10 e segurança web

OWASP Top 10 e segurança web

Comments
4 min read
Boost Your Website’s Security with SafeLine WAF: The Powerful Open-Source Solution You Need

Boost Your Website’s Security with SafeLine WAF: The Powerful Open-Source Solution You Need

Comments
2 min read
Deploying Static Files for Website Hosting in SafeLine

Deploying Static Files for Website Hosting in SafeLine

Comments
1 min read
Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Comments
4 min read
Building a Virtualized Cybersecurity Lab: Splunk SIEM Setup and Log Forwarding

Building a Virtualized Cybersecurity Lab: Splunk SIEM Setup and Log Forwarding

1
Comments
5 min read
loading...