DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

Comments
2 min read
When Time Becomes a Security Boundary in AI Systems

When Time Becomes a Security Boundary in AI Systems

Comments
2 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
Learning Astro, Offensive Security, and CI/CD

Learning Astro, Offensive Security, and CI/CD

Comments
2 min read
Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Comments
4 min read
Hunting Malware Like a Pro: A Beginner's Guide to YARA

Hunting Malware Like a Pro: A Beginner's Guide to YARA

Comments 2
4 min read
How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

How Cutting-Edge Technology Shapes Today’s Crypto Trading Platforms

Comments
5 min read
Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Comments
11 min read
Security Incident Report: Cryptominer Attack on Next.js Application

Security Incident Report: Cryptominer Attack on Next.js Application

1
Comments
6 min read
Enterprise Architecture for a blog nobody reads

Enterprise Architecture for a blog nobody reads

Comments 1
12 min read
Be the Developer Who’s Ahead of Their Time: Meet pipq, Your New Superpower for Secure Python Development

Be the Developer Who’s Ahead of Their Time: Meet pipq, Your New Superpower for Secure Python Development

Comments
4 min read
Governance & Regulation | TryHackMe Write-Up

Governance & Regulation | TryHackMe Write-Up

Comments
4 min read
AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

AI-Powered Phishing: Recognizing Deepfakes in Your Inbox 🧠📩

Comments
4 min read
DEV Track Spotlight: Red Team vs Blue Team - Securing AI Agents (DEV317)

DEV Track Spotlight: Red Team vs Blue Team - Securing AI Agents (DEV317)

1
Comments
5 min read
Why Isn’t True Zero-Trust Encryption Used in Email Systems?

Why Isn’t True Zero-Trust Encryption Used in Email Systems?

Comments
1 min read
React2Shell: CVE-2025-55182 | TryHackMe Write-Up

React2Shell: CVE-2025-55182 | TryHackMe Write-Up

Comments
4 min read
My Writeup (0day in Zsh (RCE))

My Writeup (0day in Zsh (RCE))

6
Comments 1
5 min read
Why I switched to an unknown WAF

Why I switched to an unknown WAF

Comments
4 min read
How to Secure Your AI App Against Prompt Injection in 5 Minutes

How to Secure Your AI App Against Prompt Injection in 5 Minutes

Comments
5 min read
Zero Trust Security Explained: Why "Firewalls" Are Dead in 2026

Zero Trust Security Explained: Why "Firewalls" Are Dead in 2026

Comments
1 min read
Top 7 Cybersecurity Certifications to Launch Your Career in 2026

Top 7 Cybersecurity Certifications to Launch Your Career in 2026

Comments
2 min read
Why You Shouldn’t Rely Solely on Detectors

Why You Shouldn’t Rely Solely on Detectors

Comments
2 min read
Why I Recommend You to Migrate from Cloudflare to SafeLine WAF

Why I Recommend You to Migrate from Cloudflare to SafeLine WAF

Comments
3 min read
ShadowWizardMoneyGang Attack Analysis and Network Fingerprint Extraction

ShadowWizardMoneyGang Attack Analysis and Network Fingerprint Extraction

Comments
4 min read
Without DNS, The Internet Won't Exist

Without DNS, The Internet Won't Exist

6
Comments
8 min read
loading...