DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)

2
Comments
13 min read
Boring Cybersecurity Theory: Where it all began

Boring Cybersecurity Theory: Where it all began

1
Comments
5 min read
Boring Cybersecurity Theory: Risk Management

Boring Cybersecurity Theory: Risk Management

1
Comments
8 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
📞 WhatsApp Missed Call Scam — The Call You Should Never Return

📞 WhatsApp Missed Call Scam — The Call You Should Never Return

4
Comments 1
4 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)

1
Comments
3 min read
Breaking into Appsec/Devsecops without being a developer: Complete roadmap

Breaking into Appsec/Devsecops without being a developer: Complete roadmap

2
Comments
3 min read
API Security

API Security

Comments
5 min read
Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed

Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed

6
Comments
3 min read
Beware: ChatGPT Could Be Attacking You!

Beware: ChatGPT Could Be Attacking You!

3
Comments 2
5 min read
How WAFs Work + One You Should Try

How WAFs Work + One You Should Try

5
Comments
3 min read
Building a Production-Ready Serverless File Sharing Platform on AWS

Building a Production-Ready Serverless File Sharing Platform on AWS

Comments
4 min read
Catch Security Bugs Before They Catch You: A Developer's Guide

Catch Security Bugs Before They Catch You: A Developer's Guide

Comments
8 min read
Bypassing censorship. Cat-and-mouse.

Bypassing censorship. Cat-and-mouse.

Comments
5 min read
Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection

Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection

1
Comments
3 min read
Application Penetration Testing: Secure Your Web and Mobile Apps Before Hackers Do

Application Penetration Testing: Secure Your Web and Mobile Apps Before Hackers Do

Comments
2 min read
Bridging the Gap Between Security and Innovation

Bridging the Gap Between Security and Innovation

Comments 1
7 min read
HTB - Bastion (Windows)

HTB - Bastion (Windows)

1
Comments
1 min read
Building Real-Time Deepfake Detection in Slack

Building Real-Time Deepfake Detection in Slack

15
Comments
5 min read
Using Blockchain to Strengthen Data Security in 2025

Using Blockchain to Strengthen Data Security in 2025

2
Comments 1
3 min read
A US-Origin Attack Nearly Killed Our SEO

A US-Origin Attack Nearly Killed Our SEO

15
Comments
2 min read
Quantum Internet: The Next Web You Can’t Hack

Quantum Internet: The Next Web You Can’t Hack

1
Comments
3 min read
A Beginner’s Guide to Building a Cyber Security Plan for Small Businesses

A Beginner’s Guide to Building a Cyber Security Plan for Small Businesses

2
Comments
3 min read
Autenticação offline de baixo custo

Autenticação offline de baixo custo

1
Comments
3 min read
Blockchain and Cryptocurrency Security: DeFi Protocol Analysis

Blockchain and Cryptocurrency Security: DeFi Protocol Analysis

3
Comments 6
3 min read
loading...