DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Hybrid Infrastructure: Why Businesses Combine Cloud and Physical Servers

Comments
2 min read
Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)

Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)

Comments
2 min read
Outil de Cybersécurité du Jour - Sep 24, 2025

Outil de Cybersécurité du Jour - Sep 24, 2025

1
Comments
3 min read
Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

1
Comments
4 min read
Digital Forensics Fundamentals | TryHackMe Write-Up

Digital Forensics Fundamentals | TryHackMe Write-Up

Comments
3 min read
Part 1: Understanding AWS Identity and Access Management (IAM)

Part 1: Understanding AWS Identity and Access Management (IAM)

Comments
4 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

2
Comments
8 min read
The Shared Responsibility Model and mistakes of public cloud providers

The Shared Responsibility Model and mistakes of public cloud providers

3
Comments
10 min read
Why is ZoomEye One of the Most Beginner-Friendly Cyberspace Search Engines?

Why is ZoomEye One of the Most Beginner-Friendly Cyberspace Search Engines?

Comments
2 min read
Top 5 Domain and IP Intelligence Tools in OSINT

Top 5 Domain and IP Intelligence Tools in OSINT

Comments
3 min read
What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

2
Comments
16 min read
The Evolving Battlefield: AI vs. AI in Network Security by Arvind Sundararajan

The Evolving Battlefield: AI vs. AI in Network Security by Arvind Sundararajan

Comments
2 min read
Best Practices for Enhancing Attack Surface Management and Accelerating Vulnerability Response

Best Practices for Enhancing Attack Surface Management and Accelerating Vulnerability Response

Comments
2 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

3
Comments
9 min read
Building a Cybersecurity Lab: Project Overview 🗺️

Building a Cybersecurity Lab: Project Overview 🗺️

7
Comments
2 min read
Cybersecurity Awareness Month: The Year in Breach

Cybersecurity Awareness Month: The Year in Breach

2
Comments
8 min read
Outil de Cybersécurité du Jour - Sep 23, 2025

Outil de Cybersécurité du Jour - Sep 23, 2025

1
Comments
3 min read
AI-Hallucinated Code Dependencies: The Emerging Software Supply Chain Risk

AI-Hallucinated Code Dependencies: The Emerging Software Supply Chain Risk

1
Comments
2 min read
Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Comments
1 min read
The AI Arms Race: Next-Gen DDoS Attacks & Adaptive Defenses

The AI Arms Race: Next-Gen DDoS Attacks & Adaptive Defenses

Comments
2 min read
From n8n Winner to Chrome AI Pioneer: Building SOC-CERT Guardian extension with Virtual CVE Intelligence 🚀

From n8n Winner to Chrome AI Pioneer: Building SOC-CERT Guardian extension with Virtual CVE Intelligence 🚀

12
Comments
5 min read
CRITICAL RCE ALERT: Patch CVE-2025-61932 in LANSCOPE Endpoint Manager NOW! (Actively Exploited)

CRITICAL RCE ALERT: Patch CVE-2025-61932 in LANSCOPE Endpoint Manager NOW! (Actively Exploited)

5
Comments
3 min read
The Rise of Self-Learning Cyberattacks: A New Era of Adaptive Threats

The Rise of Self-Learning Cyberattacks: A New Era of Adaptive Threats

Comments
2 min read
Website Hacking Project: From Exploitation to Mitigation

Website Hacking Project: From Exploitation to Mitigation

1
Comments
2 min read
Protect Your On-Premises Web Application with AWS WAF: A Step-by-Step Guide

Protect Your On-Premises Web Application with AWS WAF: A Step-by-Step Guide

Comments
14 min read
loading...