DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI-Hallucinated Code Dependencies: The Emerging Software Supply Chain Risk

AI-Hallucinated Code Dependencies: The Emerging Software Supply Chain Risk

1
Comments
2 min read
The AI Arms Race: Next-Gen DDoS Attacks & Adaptive Defenses

The AI Arms Race: Next-Gen DDoS Attacks & Adaptive Defenses

Comments
2 min read
🔥🧠 CTF DEBRIEF — REBUILDING THE FLAGS 🧩⚡

🔥🧠 CTF DEBRIEF — REBUILDING THE FLAGS 🧩⚡

1
Comments
2 min read
Understanding Authentication: Methods and Best Practices

Understanding Authentication: Methods and Best Practices

5
Comments
4 min read
[Fix] Burp Suite crashing on Kali ARM64 (Apple Silicon / QEMU)

[Fix] Burp Suite crashing on Kali ARM64 (Apple Silicon / QEMU)

Comments
1 min read
Reverse Methods for Obtaining Phone Numbers and Preventive Measures

Reverse Methods for Obtaining Phone Numbers and Preventive Measures

4
Comments
3 min read
Protege tu aplicación web On-Premises con AWS WAF: Guía paso a paso

Protege tu aplicación web On-Premises con AWS WAF: Guía paso a paso

Comments
16 min read
🔐 10 Core Concepts Every Developer Should Know About Data Security

🔐 10 Core Concepts Every Developer Should Know About Data Security

4
Comments
3 min read
5 Essential Command-Line Tools for Cybersecurity Beginners

5 Essential Command-Line Tools for Cybersecurity Beginners

Comments
5 min read
How Do the Key Rules of GDPR Shape Modern Data Protection?

How Do the Key Rules of GDPR Shape Modern Data Protection?

Comments
4 min read
CISO 101: What the Terms Mean—and How to Use Them With the Business

CISO 101: What the Terms Mean—and How to Use Them With the Business

2
Comments
4 min read
Google Knows More About You Than You Think

Google Knows More About You Than You Think

Comments
3 min read
🧭 OpenVPN vs WireGuard: Which Protocol Should Developers Use in 2025?

🧭 OpenVPN vs WireGuard: Which Protocol Should Developers Use in 2025?

Comments
4 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

2
Comments
3 min read
At-Rest vs In-Transit Encryption

At-Rest vs In-Transit Encryption

1
Comments
1 min read
Bug Bounty Hunting for GenAI

Bug Bounty Hunting for GenAI

Comments
8 min read
Securing the Software Supply Chain with Immutable Artifacts in Jenkins

Securing the Software Supply Chain with Immutable Artifacts in Jenkins

Comments
5 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
Quick Tunnel: Local Web to Public Domain

Quick Tunnel: Local Web to Public Domain

Comments
1 min read
🔐Back to the Roots: Nostalgic Journey to University CTF Battles of the Early 2010s

🔐Back to the Roots: Nostalgic Journey to University CTF Battles of the Early 2010s

Comments
8 min read
Hexadecimal: The Secret Language of Networks (and MAC Addresses)

Hexadecimal: The Secret Language of Networks (and MAC Addresses)

1
Comments
2 min read
Difference Between SOC 1 and SOC 2: A Complete Guide

Difference Between SOC 1 and SOC 2: A Complete Guide

1
Comments
2 min read
Weekly #40-2025: Rethinking How We Build, Secure, and Simplify Software

Weekly #40-2025: Rethinking How We Build, Secure, and Simplify Software

Comments
4 min read
Day 0 - Payroll Admin to Cybersecurity Analyst

Day 0 - Payroll Admin to Cybersecurity Analyst

Comments
1 min read
loading...