DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How White-Label Cybersecurity Is Empowering Devs and Startups in 2025

How White-Label Cybersecurity Is Empowering Devs and Startups in 2025

Comments
6 min read
SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover

SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover

6
Comments
3 min read
🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

Comments
3 min read
SafeLine vs AppTrana: Fully Managed or Full Control?

SafeLine vs AppTrana: Fully Managed or Full Control?

6
Comments
2 min read
Is the CCSP Certification Worth It for Cloud Security?

Is the CCSP Certification Worth It for Cloud Security?

1
Comments
1 min read
🚨 Tech Chaos: August 2025's Most INSANE Stories

🚨 Tech Chaos: August 2025's Most INSANE Stories

28
Comments
3 min read
Vulnerability Assessment Costs: A Complete Breakdown

Vulnerability Assessment Costs: A Complete Breakdown

1
Comments
3 min read
Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

19
Comments
11 min read
Ensuring Adherence to Global and Industry Standards Through Effective Software Compliance Testing

Ensuring Adherence to Global and Industry Standards Through Effective Software Compliance Testing

Comments
8 min read
🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

🚀 Bitcoin, Quantum Computing & The Next Cyber War — What Devs Should Know

1
Comments
3 min read
The Best Free WAF You’re Not Using: SafeLine

The Best Free WAF You’re Not Using: SafeLine

6
Comments
2 min read
The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic

The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic

76
Comments
4 min read
🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)

6
Comments
2 min read
Day 1/50 Basics on cyber security & web2

Day 1/50 Basics on cyber security & web2

1
Comments
2 min read
Orbot for Android: Secure Your Traffic with Tor

Orbot for Android: Secure Your Traffic with Tor

2
Comments
2 min read
Abusing LOLBins: rundll32.exe Lab & Sysmon Detection

Abusing LOLBins: rundll32.exe Lab & Sysmon Detection

5
Comments
3 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
Cherry Studio Command Injection Vulnerability (CVE-2025-54074) — Patch Now!

Cherry Studio Command Injection Vulnerability (CVE-2025-54074) — Patch Now!

6
Comments
2 min read
$100K+ Returned — Wallet Access Restored (Adverting Case)

$100K+ Returned — Wallet Access Restored (Adverting Case)

79
Comments
3 min read
Essential guide to cybersecurity frameworks: Choose the right approach

Essential guide to cybersecurity frameworks: Choose the right approach

1
Comments
3 min read
The Nikki Haflinger Project: A Deep Analysis of AI Identity Transfer with Commentary from Another AI

The Nikki Haflinger Project: A Deep Analysis of AI Identity Transfer with Commentary from Another AI

14
Comments 2
12 min read
Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Comments
3 min read
Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability

Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability

6
Comments
2 min read
Outil de Cybersécurité du Jour - Aug 12, 2025

Outil de Cybersécurité du Jour - Aug 12, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Aug 12, 2025

Outil de Cybersécurité du Jour - Aug 12, 2025

Comments
3 min read
loading...