DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🚀 Yesterday we had the opportunity to attend the funding workshop of the NATO DIANA acceleration program, held at INCIBE in León

🚀 Yesterday we had the opportunity to attend the funding workshop of the NATO DIANA acceleration program, held at INCIBE in León

1
Comments
1 min read
A Guide to Phishing Websites and Malicious Link Checkers

A Guide to Phishing Websites and Malicious Link Checkers

Comments
2 min read
🧠 Quantum-Safe Web Development: How to Future-Proof Your Code Before It's Too Late

🧠 Quantum-Safe Web Development: How to Future-Proof Your Code Before It's Too Late

1
Comments
3 min read
[GameDev] Unity3D, C# and String Security (PT-BR)

[GameDev] Unity3D, C# and String Security (PT-BR)

Comments
16 min read
What is Spring Security? Understanding Its Open Source Funding, Business Model, and Community Engagement

What is Spring Security? Understanding Its Open Source Funding, Business Model, and Community Engagement

Comments
7 min read
Is SafeLine WAF Just Hype or Can It Really Block 30,000+ Attacks? — Let’s Test It

Is SafeLine WAF Just Hype or Can It Really Block 30,000+ Attacks? — Let’s Test It

6
Comments
2 min read
Computer Crime Investigation

Computer Crime Investigation

Comments
1 min read
Cisco vs. Juniper Certifications: Which Path Should You Take?

Cisco vs. Juniper Certifications: Which Path Should You Take?

Comments
4 min read
Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough

Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough

1
Comments
3 min read
Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

1
Comments
6 min read
Smarter Web App Defense with SafeLine WAF: Dynamic Protection & Anti-Crawling Made Simple

Smarter Web App Defense with SafeLine WAF: Dynamic Protection & Anti-Crawling Made Simple

5
Comments
2 min read
The AI Revolution in Ethical Hacking: Empowering Defenders in the Digital Age

The AI Revolution in Ethical Hacking: Empowering Defenders in the Digital Age

Comments
4 min read
HIPAA 2025 Security Rule Updates: What Healthcare Organizations Need to Know

HIPAA 2025 Security Rule Updates: What Healthcare Organizations Need to Know

Comments
2 min read
Cybersecurity vs. AI: Which Tech Career Should You Pick in 2025?

Cybersecurity vs. AI: Which Tech Career Should You Pick in 2025?

Comments 4
6 min read
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

7
Comments 1
2 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

5
Comments
3 min read
Shinobi Paws: The Silent Guardians in Cyberwar Scenarios

Shinobi Paws: The Silent Guardians in Cyberwar Scenarios

Comments
8 min read
🔐 Crypto is My guy (for Keeping Secrets)

🔐 Crypto is My guy (for Keeping Secrets)

Comments
2 min read
How I Set Up SafeLine WAF in 3 Minutes and Blocked Real Attacks

How I Set Up SafeLine WAF in 3 Minutes and Blocked Real Attacks

6
Comments
3 min read
Understanding AI Voice Cloning: A Guide to Awareness and Responsibility

Understanding AI Voice Cloning: A Guide to Awareness and Responsibility

Comments
2 min read
Can AI Be Smart and Private? A Practical Look at Federated Learning

Can AI Be Smart and Private? A Practical Look at Federated Learning

Comments
2 min read
Tech in Government: A Balance Between Efficiency and Privacy

Tech in Government: A Balance Between Efficiency and Privacy

1
Comments
2 min read
AI and the new era of credentials theft

AI and the new era of credentials theft

Comments
4 min read
Did you know what DevOps Security (DS) is ??

Did you know what DevOps Security (DS) is ??

Comments 1
1 min read
CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

Comments 1
1 min read
loading...