DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploiting GraphQL Vulnerabilities: How Misconfigurations Can Lead to Data Leaks

Exploiting GraphQL Vulnerabilities: How Misconfigurations Can Lead to Data Leaks

Comments
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Papel do Desenvolvedor Back-End na Segurança Cibernética: Como Escrever Código Seguro

Papel do Desenvolvedor Back-End na Segurança Cibernética: Como Escrever Código Seguro

Comments
3 min read
Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs

Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs

Comments
3 min read
AI Defense Strategies Against Adversarial Attacks: A Practical Comparison

AI Defense Strategies Against Adversarial Attacks: A Practical Comparison

1
Comments
3 min read
How to Protect Laravel from WebSocket Vulnerabilities

How to Protect Laravel from WebSocket Vulnerabilities

2
Comments
3 min read
HackerGPT: A Powerful AI Tool for Ethical Hackers and the Cybersecurity Community

HackerGPT: A Powerful AI Tool for Ethical Hackers and the Cybersecurity Community

Comments
3 min read
How AI Helps Reduce False Positives in Cyber Threat Detection?

How AI Helps Reduce False Positives in Cyber Threat Detection?

1
Comments
3 min read
$25,000 Bug Bounty for a GraphQL Security Flaw!

$25,000 Bug Bounty for a GraphQL Security Flaw!

Comments
1 min read
How Blockchain Can Revolutionize Genomic Data Security

How Blockchain Can Revolutionize Genomic Data Security

Comments
3 min read
📰 Elon Musk says federal employees must document work in email or be fired

📰 Elon Musk says federal employees must document work in email or be fired

Comments
1 min read
What is Splunk Infrastructure Monitoring?

What is Splunk Infrastructure Monitoring?

Comments
3 min read
The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

Comments
9 min read
Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

Top 7 Payloads lists Every Bug Bounty Hunter Need To Know

5
Comments
3 min read
🚹 AI Outlaws: 7 Controversial Tools That Could Land You in Hot Water

🚹 AI Outlaws: 7 Controversial Tools That Could Land You in Hot Water

Comments
2 min read
SSH LLM Honeypot caught a real threat actor

SSH LLM Honeypot caught a real threat actor

5
Comments
4 min read
Scope of Cloud Security Solutions in 2025

Scope of Cloud Security Solutions in 2025

Comments
4 min read
The Cybersecurity Risks of AI-Generated Code: What You Need to Know

The Cybersecurity Risks of AI-Generated Code: What You Need to Know

6
Comments
3 min read
How to Prevent NoSQL Injection Attacks in Laravel Applications

How to Prevent NoSQL Injection Attacks in Laravel Applications

2
Comments
3 min read
Building a Successful Career in Cybersecurity

Building a Successful Career in Cybersecurity

Comments
5 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
Mastering HTTP: A Practical Guide for Developers & Cybersecurity Enthusiasts

Mastering HTTP: A Practical Guide for Developers & Cybersecurity Enthusiasts

Comments
4 min read
Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments
7 min read
Quantum Key Distribution: A Beginner’s Guide

Quantum Key Distribution: A Beginner’s Guide

Comments
15 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
loading...