DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
👋 Hey Dev Community! I’m Rohit 🚀 | Full-Stack Developer | Cybersecurity Learner | Future AI Engineer 🤖

👋 Hey Dev Community! I’m Rohit 🚀 | Full-Stack Developer | Cybersecurity Learner | Future AI Engineer 🤖

Comments
2 min read
How I Built “Project Access” — My Mission to Get My First Laptop as a Cybersecurity Student.

How I Built “Project Access” — My Mission to Get My First Laptop as a Cybersecurity Student.

Comments 1
1 min read
🛡️ Launching Cyber Security Guard Defense Stack – AI-Powered & Open Source

🛡️ Launching Cyber Security Guard Defense Stack – AI-Powered & Open Source

Comments
1 min read
SREday SF 2025: Human Centered SRE In An AI World

SREday SF 2025: Human Centered SRE In An AI World

Comments
7 min read
SOC 1 vs SOC 2 vs SOC 3: What’s the Real Difference and Which One Do You Need?

SOC 1 vs SOC 2 vs SOC 3: What’s the Real Difference and Which One Do You Need?

Comments
6 min read
From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

Comments 1
5 min read
Cybersecurity 101 : data sanitization

Cybersecurity 101 : data sanitization

1
Comments
3 min read
Building a Process Injection Detector in Rust

Building a Process Injection Detector in Rust

1
Comments
3 min read
Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools

Cybersecurity Weekly #9: AI-Powered Phishing Inside Collaboration Tools

2
Comments
2 min read
Hunting API Keys in the Wild: How I Built FleaMarket to Find (and Help Fix) Real Leaks on GitHub

Hunting API Keys in the Wild: How I Built FleaMarket to Find (and Help Fix) Real Leaks on GitHub

18
Comments 6
3 min read
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
Hack a Windows System Using PowerShell

Hack a Windows System Using PowerShell

6
Comments 1
6 min read
Boost Your Website Security with SafeLine – No Cost, All Protection!

Boost Your Website Security with SafeLine – No Cost, All Protection!

5
Comments
2 min read
🚀 5 Things Every Beginner in Cybersecurity Should Know

🚀 5 Things Every Beginner in Cybersecurity Should Know

1
Comments
3 min read
ATTACKS ANALYSIS IN TCP/IP USING WIRESHARK

ATTACKS ANALYSIS IN TCP/IP USING WIRESHARK

Comments
2 min read
How AI is Revolutionizing Malware Detection in Modern Software Systems

How AI is Revolutionizing Malware Detection in Modern Software Systems

Comments 1
4 min read
Rethinking Security Resilience And Getting Back To Basics At CornCon 11

Rethinking Security Resilience And Getting Back To Basics At CornCon 11

4
Comments
8 min read
Enterprise Security & Adversary Emulation Stop Click Fraud and Click Farms

Enterprise Security & Adversary Emulation Stop Click Fraud and Click Farms

Comments
3 min read
httprecon3: The Ultimate Stealthy Recon Tool for Bug Bounty Hunters and Pentesters

httprecon3: The Ultimate Stealthy Recon Tool for Bug Bounty Hunters and Pentesters

2
Comments 1
4 min read
Don't Run That Code! Your Guide to Staying Safe from Job Scams with Virtual Machines

Don't Run That Code! Your Guide to Staying Safe from Job Scams with Virtual Machines

Comments
3 min read
VM Safety Configuration: A Developer's Guide

VM Safety Configuration: A Developer's Guide

Comments
6 min read
The Real Reason Most Pentests Miss Critical Vulnerabilities

The Real Reason Most Pentests Miss Critical Vulnerabilities

1
Comments
3 min read
AWS Route 53 Resolver DNS Firewall — The First Line of Egress Defense

AWS Route 53 Resolver DNS Firewall — The First Line of Egress Defense

6
Comments
4 min read
Rubber Ducky clone with Pro Micro micro controller

Rubber Ducky clone with Pro Micro micro controller

1
Comments
4 min read
🧪 Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

🧪 Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

30
Comments 2
4 min read
loading...