DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding the 11 Most Common Types of Cyber Attacks

Understanding the 11 Most Common Types of Cyber Attacks

Comments 1
2 min read
The Evolution of Email Threats: From Spam to Advanced Phishing

The Evolution of Email Threats: From Spam to Advanced Phishing

Comments 1
3 min read
How to Plan a Corporate Data Migration to the Cloud with Security and High Availability

How to Plan a Corporate Data Migration to the Cloud with Security and High Availability

Comments
2 min read
When AI Models Gossip: What One Model Thinks About Another

When AI Models Gossip: What One Model Thinks About Another

1
Comments
8 min read
The Business-First Approach to Cybersecurity: Why Technical Excellence Isn't Enough in 2025

The Business-First Approach to Cybersecurity: Why Technical Excellence Isn't Enough in 2025

Comments 1
4 min read
The Ultimate Guide to Cyber Threat Actors: Exploring Hackers, Hacktivists, and Their Tactics

The Ultimate Guide to Cyber Threat Actors: Exploring Hackers, Hacktivists, and Their Tactics

Comments
6 min read
Who is 5hezy?

Who is 5hezy?

Comments
2 min read
Key Differences Between Vulnerability Assessment and Penetration Testing

Key Differences Between Vulnerability Assessment and Penetration Testing

5
Comments
1 min read
🕵️‍♂️ Inside DeepSeek: Unmasking China's AI-Powered Cyber Offensive in 2025

🕵️‍♂️ Inside DeepSeek: Unmasking China's AI-Powered Cyber Offensive in 2025

2
Comments
3 min read
🛡️ Examining the Database in SQL Injection Attacks

🛡️ Examining the Database in SQL Injection Attacks

Comments 1
4 min read
VAPT for SaaS Startups: Early Security Investment That Pays Off

VAPT for SaaS Startups: Early Security Investment That Pays Off

Comments
4 min read
Passwords Are a Ticking Timebomb—And These Breaches Prove It

Passwords Are a Ticking Timebomb—And These Breaches Prove It

Comments
2 min read
Cyber Psychology: The Human Factor and Social Engineering

Cyber Psychology: The Human Factor and Social Engineering

Comments
4 min read
Behind the Cloud - The TRUTH About TeraBox.

Behind the Cloud - The TRUTH About TeraBox.

4
Comments
5 min read
Timeline: My Career Shift from Mechanical Engineer to Cybersecurity

Timeline: My Career Shift from Mechanical Engineer to Cybersecurity

Comments
5 min read
How I Automated IP Blacklisting in SafeLine WAF Using the Open API

How I Automated IP Blacklisting in SafeLine WAF Using the Open API

5
Comments 1
3 min read
HPKP: What is HTTP Public Key Pinning?

HPKP: What is HTTP Public Key Pinning?

Comments
5 min read
How to Stand Strong Against Cyberbullying

How to Stand Strong Against Cyberbullying

Comments
3 min read
The Rising Threat of OTP Scams and How to Stay Safe

The Rising Threat of OTP Scams and How to Stay Safe

Comments
3 min read
Incognito Mode Is a Lie Here’s Who Still Sees You

Incognito Mode Is a Lie Here’s Who Still Sees You

Comments
3 min read
How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

Comments
1 min read
Securing the Future: How the Agentic AI Approach is Transforming IoT and OT Cybersecurity

Securing the Future: How the Agentic AI Approach is Transforming IoT and OT Cybersecurity

1
Comments
3 min read
Investigation Report

Investigation Report

1
Comments
1 min read
Rapports d'investigations

Rapports d'investigations

Comments
2 min read
Building Self-Healing SaaS Applications with Django & Frappe

Building Self-Healing SaaS Applications with Django & Frappe

Comments
2 min read
loading...