DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How a Growing Web Platform Defeated CC Attacks with Semantic Analysis WAF

How a Growing Web Platform Defeated CC Attacks with Semantic Analysis WAF

Comments
3 min read
How One Team Finally Stopped Application-Layer Attacks with Semantic Analysis

How One Team Finally Stopped Application-Layer Attacks with Semantic Analysis

Comments
3 min read
Everyone Talks About Clean Architecture — No One Fixes the Data Layer

Everyone Talks About Clean Architecture — No One Fixes the Data Layer

Comments
1 min read
Cybersecurity tools: SIEM or are companies really spying on us

Cybersecurity tools: SIEM or are companies really spying on us

Comments
7 min read
Building a Virtualized Cybersecurity Lab: Introducing an Adversary with Kali Linux

Building a Virtualized Cybersecurity Lab: Introducing an Adversary with Kali Linux

Comments
5 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
What Is My IP Address?

What Is My IP Address?

1
Comments
7 min read
How to Put an End to CC Attacks

How to Put an End to CC Attacks

Comments
4 min read
Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
How we made email authentication actually usable inside editors and AI agents

How we made email authentication actually usable inside editors and AI agents

1
Comments
2 min read
What Kind of Customer Data Do Companies Capture?

What Kind of Customer Data Do Companies Capture?

Comments
5 min read
Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Comments
3 min read
🖼️ ExifPlus: Why Metadata Matters in Bug Bounty Testing & How to Protect Your App from Hidden Image Data

🖼️ ExifPlus: Why Metadata Matters in Bug Bounty Testing & How to Protect Your App from Hidden Image Data

Comments
3 min read
Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Comments
3 min read
Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Comments
2 min read
Identity Alone Fails in Autonomous Systems

Identity Alone Fails in Autonomous Systems

Comments
1 min read
I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

Comments
2 min read
When Time Becomes a Security Boundary in AI Systems

When Time Becomes a Security Boundary in AI Systems

Comments
2 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
Learning Astro, Offensive Security, and CI/CD

Learning Astro, Offensive Security, and CI/CD

Comments
2 min read
Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Comments
4 min read
Hunting Malware Like a Pro: A Beginner's Guide to YARA

Hunting Malware Like a Pro: A Beginner's Guide to YARA

Comments 2
4 min read
How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

Comments
5 min read
Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Comments
11 min read
Security Incident Report: Cryptominer Attack on Next.js Application

Security Incident Report: Cryptominer Attack on Next.js Application

1
Comments
6 min read
loading...