DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Your Site in Minutes: Open-Source WAF With 99%+ Accuracy and Zero Hassle

Secure Your Site in Minutes: Open-Source WAF With 99%+ Accuracy and Zero Hassle

7
Comments
3 min read
These 12 DDoS Attacks Shook the Internet to Its Core

These 12 DDoS Attacks Shook the Internet to Its Core

1
Comments
2 min read
Ransomware Isn’t a File — It’s a Strategy: What Defenders Still Get Wrong

Ransomware Isn’t a File — It’s a Strategy: What Defenders Still Get Wrong

Comments
2 min read
ShieldEye - Automated Vulnerability Scanner

ShieldEye - Automated Vulnerability Scanner

1
Comments
1 min read
Build a SOC simulator using Google AI Studio

Build a SOC simulator using Google AI Studio

7
Comments 1
2 min read
Safeguarding AI at Scale: The Six Security Pillars Behind RunC.AI

Safeguarding AI at Scale: The Six Security Pillars Behind RunC.AI

6
Comments
5 min read
Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Comments
3 min read
What Is Phishing? Real-Life Examples and Protection Tips

What Is Phishing? Real-Life Examples and Protection Tips

Comments
3 min read
Ransomware Explained: How It Works and How to Defend Against It

Ransomware Explained: How It Works and How to Defend Against It

Comments
4 min read
What Is a DDoS Attack? Causes, Effects, and Prevention Tips

What Is a DDoS Attack? Causes, Effects, and Prevention Tips

Comments
4 min read
Common Types of Cyber Attacks and How to Prevent Them

Common Types of Cyber Attacks and How to Prevent Them

Comments
3 min read
Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It

Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It

1
Comments
1 min read
Understanding Server-Side Request Forgery (SSRF): A Growing Web Security Threat

Understanding Server-Side Request Forgery (SSRF): A Growing Web Security Threat

5
Comments
4 min read
How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow

How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow

Comments
4 min read
Beginner's Understanding of DAST

Beginner's Understanding of DAST

1
Comments
3 min read
GrayHATGroupX69: A Silent Cyber War Led by M5TL

GrayHATGroupX69: A Silent Cyber War Led by M5TL

1
Comments
2 min read
🔐 Why do banks, supposedly the most secure institutions, still use such weak security measures?

🔐 Why do banks, supposedly the most secure institutions, still use such weak security measures?

1
Comments
1 min read
Penetration Testing Firms: 10 Red Flags Every Business Should Know

Penetration Testing Firms: 10 Red Flags Every Business Should Know

1
Comments
22 min read
✈️ Qantas Cyberattack Exposes 6 Million Passenger Records: A Wake-Up Call for the Aviation Industry

✈️ Qantas Cyberattack Exposes 6 Million Passenger Records: A Wake-Up Call for the Aviation Industry

3
Comments
4 min read
Zeroize: The Tiny and Memory-Safe Rust Crate

Zeroize: The Tiny and Memory-Safe Rust Crate

1
Comments
2 min read
Firebox T45 vs Firebox T40: WatchGuard Solutions for Small and Medium-Sized Enterprises

Firebox T45 vs Firebox T40: WatchGuard Solutions for Small and Medium-Sized Enterprises

Comments
3 min read
TryHackMe: DNS in Detail

TryHackMe: DNS in Detail

Comments
2 min read
Understanding SOC 2 Compliance: A Comprehensive Guide

Understanding SOC 2 Compliance: A Comprehensive Guide

Comments
4 min read
Why Hackers Want Your Personal Data (And How They Use It)

Why Hackers Want Your Personal Data (And How They Use It)

2
Comments
3 min read
CVE-2024-8190: Ivanti Cloud Services Appliance OS Command Injection Vulnerability

CVE-2024-8190: Ivanti Cloud Services Appliance OS Command Injection Vulnerability

Comments
2 min read
loading...