DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Double-Edged Sword: AI’s Role in Modern Cybersecurity

The Double-Edged Sword: AI’s Role in Modern Cybersecurity

Comments
1 min read
Resilient Roots, Cloudy Heights: My Cybersecurity Journey from Nigeria

Resilient Roots, Cloudy Heights: My Cybersecurity Journey from Nigeria

1
Comments
3 min read
New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File

New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File

6
Comments 2
2 min read
Another security patch. Another missed opportunity.

Another security patch. Another missed opportunity.

Comments
3 min read
Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor

Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor

3
Comments
4 min read
Your WhatsApp Chats Aren’t as Private as You Think!

Your WhatsApp Chats Aren’t as Private as You Think!

3
Comments 3
4 min read
Exploring Security Risks and Vulnerabilities in Model Context Protocol (MCP): The Emerging Challenge for AI Systems

Exploring Security Risks and Vulnerabilities in Model Context Protocol (MCP): The Emerging Challenge for AI Systems

Comments 2
15 min read
TryHackMe Splunk: Basics

TryHackMe Splunk: Basics

1
Comments
3 min read
Log Aggregation with Python: Bringing Clarity to Distributed Security Data

Log Aggregation with Python: Bringing Clarity to Distributed Security Data

Comments
4 min read
Advancing Python in Cybersecurity: Automation, Threat Detection, and Smarter Scripting

Advancing Python in Cybersecurity: Automation, Threat Detection, and Smarter Scripting

1
Comments 1
4 min read
Building a Log Parser in Python: Turning Raw Logs into Security Insights

Building a Log Parser in Python: Turning Raw Logs into Security Insights

3
Comments
4 min read
What If Compliance Was Cool? Turning ISO into a Competitive Edge

What If Compliance Was Cool? Turning ISO into a Competitive Edge

1
Comments 1
5 min read
Cybersecurity Essentials for the Modern Workplace

Cybersecurity Essentials for the Modern Workplace

1
Comments
1 min read
How i Became a Pentester | Como me Tornei um Pentester

How i Became a Pentester | Como me Tornei um Pentester

1
Comments
5 min read
Salesforce Security Best Practices for Admins in 2025

Salesforce Security Best Practices for Admins in 2025

Comments
1 min read
Taking Python Further in Cybersecurity: Real-World Applications and Projects

Taking Python Further in Cybersecurity: Real-World Applications and Projects

Comments
4 min read
Understanding Black Hat Hackers: Techniques, Impacts, and Prevention

Understanding Black Hat Hackers: Techniques, Impacts, and Prevention

1
Comments
6 min read
Introducing SASTGPT: an AI-powered SAST

Introducing SASTGPT: an AI-powered SAST

Comments
4 min read
What is GRC Compliance and Why It Matters for Businesses

What is GRC Compliance and Why It Matters for Businesses

Comments
2 min read
Honeypots Cyber security

Honeypots Cyber security

Comments
2 min read
OAuth or JWT? Everything Developers Need to Know in 2025

OAuth or JWT? Everything Developers Need to Know in 2025

1
Comments
4 min read
Do Red Rooms Really Exist? Unpacking the Dark‑Web Rumor

Do Red Rooms Really Exist? Unpacking the Dark‑Web Rumor

2
Comments
3 min read
The Basics of Python and Cybersecurity: A Beginner’s Guide

The Basics of Python and Cybersecurity: A Beginner’s Guide

2
Comments 1
4 min read
A Comprehensive Guide to Bug Hunting

A Comprehensive Guide to Bug Hunting

Comments
4 min read
RootMe | TryHackMe | Spanish

RootMe | TryHackMe | Spanish

1
Comments
4 min read
loading...