DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Networking - What it is and Why You Need to Know It?

Networking - What it is and Why You Need to Know It?

Comments
2 min read
Discover The SSL/TLS Security Analyzer API

Discover The SSL/TLS Security Analyzer API

1
Comments
2 min read
Secure Your APIs with Apache APISIX + SafeLine WAF

Secure Your APIs with Apache APISIX + SafeLine WAF

6
Comments
2 min read
Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

1
Comments
2 min read
FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Security Alert: XXE Vulnerability in Weaver e-cology OA

Security Alert: XXE Vulnerability in Weaver e-cology OA

6
Comments
2 min read
🚀 Starting My Cybersecurity Journey: Why I Chose This Path

🚀 Starting My Cybersecurity Journey: Why I Chose This Path

Comments
1 min read
Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

1
Comments
3 min read
Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

10
Comments
3 min read
The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

1
Comments
4 min read
SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

6
Comments
3 min read
How to Secure Different User Types in Linux: A Guide for IT Teams

How to Secure Different User Types in Linux: A Guide for IT Teams

1
Comments
5 min read
Security as Physics: Thinking About Networks Like Energy Systems

Security as Physics: Thinking About Networks Like Energy Systems

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 7, 2025

Outil de Cybersécurité du Jour - Sep 7, 2025

5
Comments
3 min read
Man-in-the-Middle Attacks Explained (And How to Stay Safe)

Man-in-the-Middle Attacks Explained (And How to Stay Safe)

7
Comments
3 min read
Password Cracking Project #1 – From Privilege Escalation to Hashcat

Password Cracking Project #1 – From Privilege Escalation to Hashcat

5
Comments
1 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

9
Comments 2
5 min read
CWE-1434: Insecure Setting of #Generative AI/ML #Model Inference #Parameters

CWE-1434: Insecure Setting of #Generative AI/ML #Model Inference #Parameters

1
Comments
1 min read
Redirector OSINT - One-Command Redirect & Logging Tool

Redirector OSINT - One-Command Redirect & Logging Tool

5
Comments
1 min read
Element: The Open-Source Federated System for Secure Messaging, Voice, and Video

Element: The Open-Source Federated System for Secure Messaging, Voice, and Video

1
Comments
1 min read
Revolutionizing Cybersecurity with AI: The CAI Framework

Revolutionizing Cybersecurity with AI: The CAI Framework

5
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 5, 2025

Outil de Cybersécurité du Jour - Sep 5, 2025

5
Comments
3 min read
loading...