DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Feistel Cipher: The Architectural Marvel Behind Modern Cryptography

Feistel Cipher: The Architectural Marvel Behind Modern Cryptography

Comments
1 min read
Best Beginner’s Guide For Cybersecurity Recon with Python

Best Beginner’s Guide For Cybersecurity Recon with Python

5
Comments
8 min read
"Apple Music" Sent a Renewal Email to my Android…

"Apple Music" Sent a Renewal Email to my Android…

Comments
4 min read
🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

10
Comments
3 min read
Flutter Dev + AppSec Engineer Built a KRA PIN Checker That Stores ZERO User Data (And Still Makes Money with M-Pesa Tokens) 🛡️🇰🇪

Flutter Dev + AppSec Engineer Built a KRA PIN Checker That Stores ZERO User Data (And Still Makes Money with M-Pesa Tokens) 🛡️🇰🇪

Comments
3 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

5
Comments
4 min read
How to Push Your Code from Visual Studio (Local) to GitHub Using Git the Terminal.[Beginner's Guide]

How to Push Your Code from Visual Studio (Local) to GitHub Using Git the Terminal.[Beginner's Guide]

1
Comments
3 min read
OWASP Top 10 e segurança web

OWASP Top 10 e segurança web

Comments
4 min read
Boost Your Website’s Security with SafeLine WAF: The Powerful Open-Source Solution You Need

Boost Your Website’s Security with SafeLine WAF: The Powerful Open-Source Solution You Need

Comments
2 min read
Deploying Static Files for Website Hosting in SafeLine

Deploying Static Files for Website Hosting in SafeLine

Comments
1 min read
Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Comments
4 min read
Building a Virtualized Cybersecurity Lab: Splunk SIEM Setup and Log Forwarding

Building a Virtualized Cybersecurity Lab: Splunk SIEM Setup and Log Forwarding

1
Comments
5 min read
90-Day Proven Post-Quantum TLS Readiness Sprint

90-Day Proven Post-Quantum TLS Readiness Sprint

2
Comments
7 min read
The 2011 Japan Earthquake: Impact on IT Infrastructure and Data Security

The 2011 Japan Earthquake: Impact on IT Infrastructure and Data Security

Comments
2 min read
How SafeLine’s Dynamic Protection Safeguards Your Website

How SafeLine’s Dynamic Protection Safeguards Your Website

Comments
3 min read
БД4 Практ (Insert)

БД4 Практ (Insert)

Comments
1 min read
🖼️ ExifPlus: Why Metadata Matters in Bug Bounty Testing & How to Protect Your App from Hidden Image Data

🖼️ ExifPlus: Why Metadata Matters in Bug Bounty Testing & How to Protect Your App from Hidden Image Data

1
Comments
3 min read
Firebase Security Is Broken. Here's the Tool I Built to Fix It.

Firebase Security Is Broken. Here's the Tool I Built to Fix It.

2
Comments
2 min read
Self-Hosted Web Application Firewall for My Homelab

Self-Hosted Web Application Firewall for My Homelab

1
Comments
2 min read
Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

1
Comments
1 min read
When AI Learns to Hack

When AI Learns to Hack

35
Comments 1
20 min read
6 Top WordPress Security Plugins to Use in 2026

6 Top WordPress Security Plugins to Use in 2026

2
Comments 2
5 min read
Wildbox: all-in-one open security platform

Wildbox: all-in-one open security platform

Comments
1 min read
Building a Ransomware Playbook That Actually Works

Building a Ransomware Playbook That Actually Works

Comments
5 min read
Leaky Bucket: Full Attack Chain Against Public S3-Compatible Buckets in Yandex Cloud

Leaky Bucket: Full Attack Chain Against Public S3-Compatible Buckets in Yandex Cloud

15
Comments
4 min read
loading...