DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Session Hijacking: Detection, Prevention, and Mitigation

Understanding Session Hijacking: Detection, Prevention, and Mitigation

Comments
6 min read
What is a Denial of Service (DoS) Attack? A Comprehensive Guide

What is a Denial of Service (DoS) Attack? A Comprehensive Guide

Comments
8 min read
Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Comments
7 min read
What is a Firewall? How It Works to Protect Your Data (Beginner’s Guide)

What is a Firewall? How It Works to Protect Your Data (Beginner’s Guide)

Comments
4 min read
Understanding SQL Injection: What It Is and How to Protect Your Website

Understanding SQL Injection: What It Is and How to Protect Your Website

Comments
7 min read
The Role of MIS in National Cybersecurity: Beyond the Private Sector:

The Role of MIS in National Cybersecurity: Beyond the Private Sector:

Comments
2 min read
🚨 Is Red Eléctrica Española Exposing Its SCADA System? 🚨

🚨 Is Red Eléctrica Española Exposing Its SCADA System? 🚨

1
Comments
1 min read
When Your Login Page Becomes the Frontline: Lessons from a Real-World enumeration attack

When Your Login Page Becomes the Frontline: Lessons from a Real-World enumeration attack

Comments
5 min read
Automatic VPN Connectivity for Entra ID-Only Windows Devices: A Native Approach

Automatic VPN Connectivity for Entra ID-Only Windows Devices: A Native Approach

Comments
3 min read
Man-in-the-Middle (MitM) Attacks: Types, Detection, and Prevention Tips

Man-in-the-Middle (MitM) Attacks: Types, Detection, and Prevention Tips

Comments
7 min read
Understanding Gray Hat Hackers: Definition, Techniques, and Implications

Understanding Gray Hat Hackers: Definition, Techniques, and Implications

Comments
7 min read
Understanding Spear Phishing: How to Protect Yourself from Targeted Cyber Attacks

Understanding Spear Phishing: How to Protect Yourself from Targeted Cyber Attacks

Comments
8 min read
Enhancing Your Cybersecurity Practices in 2024: | by Faruk Ahmed

Enhancing Your Cybersecurity Practices in 2024: | by Faruk Ahmed

Comments
1 min read
How AI is Transforming Cybersecurity: Opportunities and Challenges | by Faruk Ahmed | Apr, 2025

How AI is Transforming Cybersecurity: Opportunities and Challenges | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Key Application Security Types & The Tools You Need to Protect Them

5 Key Application Security Types & The Tools You Need to Protect Them

1
Comments
5 min read
What Are White Hat Hackers? A Guide to Ethical Hacking

What Are White Hat Hackers? A Guide to Ethical Hacking

Comments
6 min read
Understanding Network Attacks: Types, Impact, and Prevention Strategies

Understanding Network Attacks: Types, Impact, and Prevention Strategies

Comments
8 min read
Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Comments
7 min read
Understanding IoT Attacks: Types, Risks, and Protection Strategies

Understanding IoT Attacks: Types, Risks, and Protection Strategies

Comments
4 min read
Zero-Day Exploits: What They Are, How They Work, and How to Defend Against Them

Zero-Day Exploits: What They Are, How They Work, and How to Defend Against Them

Comments
6 min read
Ultimate Ubuntu 24.04 VPS Security Setup Guide: How to Not Get Hacked in 2025

Ultimate Ubuntu 24.04 VPS Security Setup Guide: How to Not Get Hacked in 2025

Comments 1
9 min read
Understanding Trojans: What They Are and How to Protect Yourself

Understanding Trojans: What They Are and How to Protect Yourself

1
Comments
6 min read
What is Adware? Understanding Its Impact and How to Protect Yourself

What is Adware? Understanding Its Impact and How to Protect Yourself

1
Comments
6 min read
Understanding Keylogging: What It Is, Risks, and How to Protect Yourself

Understanding Keylogging: What It Is, Risks, and How to Protect Yourself

Comments
6 min read
What is a Vulnerability Assessment? Importance, Key Steps, and Tools

What is a Vulnerability Assessment? Importance, Key Steps, and Tools

Comments
7 min read
loading...