DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Resolving an E-commerce DNS Hijack via a Compromised Cloudflare Account

Resolving an E-commerce DNS Hijack via a Compromised Cloudflare Account

Comments
4 min read
How a Former Developer Hijacked a WordPress Site

How a Former Developer Hijacked a WordPress Site

Comments
4 min read
Cybersecurity in the AI Era: It's Not a Feature, It's Genetic Code

Cybersecurity in the AI Era: It's Not a Feature, It's Genetic Code

4
Comments
3 min read
Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Comments
7 min read
AI Has Gone Physical: Can We Still Keep It Safe?

AI Has Gone Physical: Can We Still Keep It Safe?

Comments
5 min read
Forgotten Email Accounts: The Hidden Security Trap Developers Overlook

Forgotten Email Accounts: The Hidden Security Trap Developers Overlook

5
Comments
2 min read
Data Breaches from Messaging Apps: 2020–2024 — Lessons for a Safer Digital Future

Data Breaches from Messaging Apps: 2020–2024 — Lessons for a Safer Digital Future

Comments
3 min read
Securing Your Ubuntu Server: SSH Two-Factor Authentication with Google Authenticator

Securing Your Ubuntu Server: SSH Two-Factor Authentication with Google Authenticator

6
Comments 1
4 min read
Cloud Security Protecting Your Data in the Digital Sky

Cloud Security Protecting Your Data in the Digital Sky

5
Comments
2 min read
AI Browsers and Prompt Injection: The New Cybersecurity Frontier

AI Browsers and Prompt Injection: The New Cybersecurity Frontier

3
Comments 5
6 min read
How to Prove to Clients That Your Firm’s Cloud Is Secure: Certifications, Audits, and Building Trust

How to Prove to Clients That Your Firm’s Cloud Is Secure: Certifications, Audits, and Building Trust

Comments
5 min read
WordPress Hacked? How I Restored a Client’s Site After Everything Was Deleted

WordPress Hacked? How I Restored a Client’s Site After Everything Was Deleted

Comments
2 min read
Building a safer cURL using TOR

Building a safer cURL using TOR

5
Comments 2
3 min read
Deepfakes Are on the Rise: How Worried Should We Be?

Deepfakes Are on the Rise: How Worried Should We Be?

Comments
6 min read
Firewall Fundamentals | TryHackMe Write-Up

Firewall Fundamentals | TryHackMe Write-Up

Comments
2 min read
IDS Fundamentals | TryHackMe Write-Up

IDS Fundamentals | TryHackMe Write-Up

Comments
2 min read
CyberChef: The Basics | TryHackMe Write-Up

CyberChef: The Basics | TryHackMe Write-Up

Comments
3 min read
4 ερωτήσεις για IT Systems Architect (Αρχιτέκτονας Συστημάτων Πληροφορικής). Τομέας: Ασφάλεια & Διαχείριση Πρόσβασης.

4 ερωτήσεις για IT Systems Architect (Αρχιτέκτονας Συστημάτων Πληροφορικής). Τομέας: Ασφάλεια & Διαχείριση Πρόσβασης.

Comments
1 min read
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

1
Comments
10 min read
🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many

🕵️‍♂️ Understanding Sybil Attacks: When One User Pretends to Be Many

Comments
3 min read
SOC 2 vs. ISO 27001: Which Matters More for Legal Practices and Building Client Trust

SOC 2 vs. ISO 27001: Which Matters More for Legal Practices and Building Client Trust

Comments
4 min read
Plesk in 2025 — The All-in-One Hosting Control Panel That Might Just Replace Everything Else

Plesk in 2025 — The All-in-One Hosting Control Panel That Might Just Replace Everything Else

Comments
3 min read
What Is Tailscale? The VPN That Doesn’t Suck

What Is Tailscale? The VPN That Doesn’t Suck

Comments
3 min read
What Is Rancher? The DevOps Superpower You Didn’t Know You Needed

What Is Rancher? The DevOps Superpower You Didn’t Know You Needed

Comments
3 min read
Pen Testing OT/SCADA Systems

Pen Testing OT/SCADA Systems

Comments
6 min read
loading...