DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fraud Detection with Knowledge Graphs: A Protégé and VidyaAstra Approach

Fraud Detection with Knowledge Graphs: A Protégé and VidyaAstra Approach

Comments
16 min read
SafeLine: The Open-Source WAF That Protects Your Web Applications from Every Angle

SafeLine: The Open-Source WAF That Protects Your Web Applications from Every Angle

Comments 1
4 min read
Why Wazuh Missed React2Shell

Why Wazuh Missed React2Shell

1
Comments
6 min read
7 Urgent Fixes: Fortinet SAML Auth Bypass

7 Urgent Fixes: Fortinet SAML Auth Bypass

3
Comments
6 min read
SafeLine: A Modern Take on Self-Hosted Web Application Security

SafeLine: A Modern Take on Self-Hosted Web Application Security

Comments
4 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
Red Queen Hypothesis and The Crescendo Jailbreak Attack Explained

Red Queen Hypothesis and The Crescendo Jailbreak Attack Explained

Comments
3 min read
Securing Cross-Border E-Commerce with SafeLine: A Case Study of Protecting an Independent Online Store

Securing Cross-Border E-Commerce with SafeLine: A Case Study of Protecting an Independent Online Store

Comments
5 min read
Advent of Cyber 2025: Day 8 & 9 Writeup Prompt Injection | TryHackMe

Advent of Cyber 2025: Day 8 & 9 Writeup Prompt Injection | TryHackMe

Comments
2 min read
How I Protect My Website From Real Attacks With SafeLine WAF

How I Protect My Website From Real Attacks With SafeLine WAF

Comments
4 min read
SafeLine: The Open-Source WAF That Holds the Line Until Your Code is Ready

SafeLine: The Open-Source WAF That Holds the Line Until Your Code is Ready

Comments
4 min read
The Future of Private AI: Secure, Cost‑Effective Small Language Models (SLMs) for Domain‑Specific Environments

The Future of Private AI: Secure, Cost‑Effective Small Language Models (SLMs) for Domain‑Specific Environments

32
Comments 2
5 min read
ISO 27001 in 6 Months

ISO 27001 in 6 Months

Comments
4 min read
Hello dev.to! I’m Sergey — developer of Suri Oculus

Hello dev.to! I’m Sergey — developer of Suri Oculus

Comments
1 min read
Social Engineering: Why Humans Are the Weakest Link in Cybersecurity

Social Engineering: Why Humans Are the Weakest Link in Cybersecurity

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.