DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

The LastPass Crypto Nightmare Proves We've Been Wrong About Password Managers

Comments
6 min read
LanManVan: My Journey Building a Modular Security Framework in Go

LanManVan: My Journey Building a Modular Security Framework in Go

5
Comments
2 min read
I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

Comments
6 min read
When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model

When Data Breaches Become Loyalty Programs: How $1.17 Billion in Vouchers Broke the Security Incentive Model

Comments
6 min read
How to Set Up Your First IAM User in 5 Minutes on AWS

How to Set Up Your First IAM User in 5 Minutes on AWS

Comments
2 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

7 Urgent Fixes: WatchGuard Firebox Zero-Day CVE-2025-14733

3
Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
Stop the Hijack: A Developer's Guide to AI Agent Security and Tool Guardrails

Stop the Hijack: A Developer's Guide to AI Agent Security and Tool Guardrails

5
Comments
5 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

SafeLine v9.3.0: Evolving a Semantic Analysis WAF for Modern Web Security

Comments
3 min read
Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Linux for Cybersecurity: The Commands That Actually Matter (Reality Check)

Comments
3 min read
No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

No Complex Regular Expressions Required: The New SLS Data Masking Function Makes Privacy Protection Simpler and More Efficient

Comments
7 min read
When App Privacy Rules Become Platform Power Levers

When App Privacy Rules Become Platform Power Levers

Comments
4 min read
Why Semantic Analysis Is the Only Sustainable WAF Strategy Going Forward

Why Semantic Analysis Is the Only Sustainable WAF Strategy Going Forward

Comments
3 min read
SafeLine v9.3.0: Major Upgrade with Semantic Analysis Detection Engine

SafeLine v9.3.0: Major Upgrade with Semantic Analysis Detection Engine

Comments
3 min read
AI-to-AI Communication: Navigating the Risks in an Interconnected AI Ecosystem

AI-to-AI Communication: Navigating the Risks in an Interconnected AI Ecosystem

Comments 4
4 min read
Healthcare Data Breaches Have Become Cost Centers, Not Emergencies

Healthcare Data Breaches Have Become Cost Centers, Not Emergencies

Comments
6 min read
Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Comments
4 min read
Cybersecurity - Secure API Development - Complete Tutorial

Cybersecurity - Secure API Development - Complete Tutorial

Comments
2 min read
How a Growing E-Commerce Startup Secured Its Web Apps with SafeLine WAF

How a Growing E-Commerce Startup Secured Its Web Apps with SafeLine WAF

Comments
3 min read
Launching CertPing, Managed SSL Certificates

Launching CertPing, Managed SSL Certificates

Comments
1 min read
Protecting a Personal Tech Blog in Practice: SafeLine Deployed in 10 Minutes

Protecting a Personal Tech Blog in Practice: SafeLine Deployed in 10 Minutes

Comments
3 min read
SafeLine WAF Log Analysis in Action: 3 Key Techniques to Uncover Business Issues

SafeLine WAF Log Analysis in Action: 3 Key Techniques to Uncover Business Issues

Comments
4 min read
loading...