DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Comments
6 min read
Fidenza's Role in Cyberwar: The Unlikely Intersection of Art, NFTs, and Cybersecurity

Fidenza's Role in Cyberwar: The Unlikely Intersection of Art, NFTs, and Cybersecurity

Comments
9 min read
How NFTs Work: The Tech Behind the Tokens

How NFTs Work: The Tech Behind the Tokens

Comments
8 min read
Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

6
Comments
4 min read
Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Comments
9 min read
Will AI Replace Cybersecurity? The Truth About the Future of Cyber Defense

Will AI Replace Cybersecurity? The Truth About the Future of Cyber Defense

Comments
4 min read
Ghost in the Network

Ghost in the Network

Comments
3 min read
The OPSEC Starter Journal: A Real-World Guide for Beginners

The OPSEC Starter Journal: A Real-World Guide for Beginners

Comments
3 min read
WHO’S IN THE MIDDLE?

WHO’S IN THE MIDDLE?

4
Comments
5 min read
Welcome to my Dev profil 👋

Welcome to my Dev profil 👋

Comments
1 min read
Step-by-Step Tutorial for Lynis on Kali Linux: Installation and Management

Step-by-Step Tutorial for Lynis on Kali Linux: Installation and Management

1
Comments
7 min read
Ashkan Rajaee's Warning: The Remote Hiring Scam No One Talks About (And What You Can Do)

Ashkan Rajaee's Warning: The Remote Hiring Scam No One Talks About (And What You Can Do)

37
Comments 31
3 min read
Top 10 Cybersecurity Companies in Dallas

Top 10 Cybersecurity Companies in Dallas

Comments
4 min read
Top 10 Cybersecurity Blog Posts That Made April 2025 a Breakthrough Month for OpenExploit

Top 10 Cybersecurity Blog Posts That Made April 2025 a Breakthrough Month for OpenExploit

Comments
4 min read
Cybersecurity for Small Businesses: A Complete Guide

Cybersecurity for Small Businesses: A Complete Guide

Comments 2
4 min read
Quantum Computing and the Future of Cryptography

Quantum Computing and the Future of Cryptography

Comments
7 min read
When Servers Talk to Strangers: SSRF

When Servers Talk to Strangers: SSRF

4
Comments
4 min read
6 Threat Actors Targeting Face Authentication in 2FA / MFA

6 Threat Actors Targeting Face Authentication in 2FA / MFA

16
Comments
3 min read
What If Your App Becomes a Tool for Scammers?

What If Your App Becomes a Tool for Scammers?

Comments
9 min read
⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

Comments
3 min read
Online vs In-Person Courses: What’s Better for Cybersecurity Training?

Online vs In-Person Courses: What’s Better for Cybersecurity Training?

Comments
2 min read
GitHub Sponsors: Navigating Privacy and Security

GitHub Sponsors: Navigating Privacy and Security

Comments
8 min read
Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Comments
5 min read
What is a Denial of Service (DoS) Attack? A Comprehensive Guide

What is a Denial of Service (DoS) Attack? A Comprehensive Guide

Comments
8 min read
Understanding Session Hijacking: Detection, Prevention, and Mitigation

Understanding Session Hijacking: Detection, Prevention, and Mitigation

Comments
6 min read
loading...