DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Does My SSL Site Return the Wrong Certificate When Accessed via IP?

Why Does My SSL Site Return the Wrong Certificate When Accessed via IP?

6
Comments 2
3 min read
8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
XSS URL Analysis and SQL Injection Workflow

XSS URL Analysis and SQL Injection Workflow

Comments
4 min read
[Hack] PicoCTF: Low Level Binary Intro - Intro to Debuggers

[Hack] PicoCTF: Low Level Binary Intro - Intro to Debuggers

Comments
9 min read
India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

Comments
2 min read
5 Best Free Reverse Proxy Solutions for 2025

5 Best Free Reverse Proxy Solutions for 2025

5
Comments
3 min read
How to Configure IIS to Use HTTP/2

How to Configure IIS to Use HTTP/2

Comments
4 min read
CISSP: Developing Strategic Security Leadership

CISSP: Developing Strategic Security Leadership

Comments 2
2 min read
Real-time cloud security thinking bigger

Real-time cloud security thinking bigger

Comments
1 min read
Cloud Security – Protecting Innovation at Cloud Speed

Cloud Security – Protecting Innovation at Cloud Speed

Comments
1 min read
💀 MaskGod: The Final Boss of URL Masking 🕶️

💀 MaskGod: The Final Boss of URL Masking 🕶️

11
Comments 4
2 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
MitM Attack in Symfony: Prevention with Secure Coding

MitM Attack in Symfony: Prevention with Secure Coding

3
Comments
4 min read
🌐 Computer Networks: The Backbone of the Internet

🌐 Computer Networks: The Backbone of the Internet

1
Comments
2 min read
Understanding Networking Commands - Why They Matter

Understanding Networking Commands - Why They Matter

3
Comments
4 min read
We Tested AI Platforms for “Vibe Scamming” - Here’s What Happened

We Tested AI Platforms for “Vibe Scamming” - Here’s What Happened

Comments
1 min read
Fine-Tuning SSL Protocols and Ciphers in SafeLine WAF

Fine-Tuning SSL Protocols and Ciphers in SafeLine WAF

5
Comments
2 min read
ИИ в кибербезопасности: нейросети для аномалий и фишинга, риски и защита

ИИ в кибербезопасности: нейросети для аномалий и фишинга, риски и защита

1
Comments
2 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

Comments
1 min read
How I Found a CORS Misconfiguration + No Rate Limiting on a Live Website

How I Found a CORS Misconfiguration + No Rate Limiting on a Live Website

5
Comments
2 min read
Why Red Teaming Isn’t Just for Cybersecurity Anymore: The rise of AI Red Teaming

Why Red Teaming Isn’t Just for Cybersecurity Anymore: The rise of AI Red Teaming

10
Comments
4 min read
CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

Comments
4 min read
Cybersecurity Metrics & KPIs in 2025: The Key Indicators Every Business Should Track

Cybersecurity Metrics & KPIs in 2025: The Key Indicators Every Business Should Track

Comments 2
3 min read
AI Truth Manipulation: How Governments Shape Reality

AI Truth Manipulation: How Governments Shape Reality

1
Comments 3
2 min read
loading...