DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Buffer Overflow in Laravel: Causes, Prevention & Fixes

Buffer Overflow in Laravel: Causes, Prevention & Fixes

4
Comments
3 min read
Eavesdropping Drones

Eavesdropping Drones

Comments
1 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

1
Comments
4 min read
Understanding SQL Injection: A Major Security Threat

Understanding SQL Injection: A Major Security Threat

13
Comments
3 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

7
Comments
6 min read
Hacking My Own Wi-Fi: A Beginner’s Guide to Wireless Security

Hacking My Own Wi-Fi: A Beginner’s Guide to Wireless Security

Comments
3 min read
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

7
Comments
2 min read
Construindo um Sistema de Presença e Autenticação usando Reconhecimento Facial com FaceIO e JavaScript

Construindo um Sistema de Presença e Autenticação usando Reconhecimento Facial com FaceIO e JavaScript

9
Comments
7 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

5
Comments
1 min read
Comparing VPN Performance: State-of-the-Art Solutions in Stable vs. Unreliable Networks

Comparing VPN Performance: State-of-the-Art Solutions in Stable vs. Unreliable Networks

7
Comments 1
8 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
Quality software = Secure software

Quality software = Secure software

Comments
3 min read
How AI Will Impact Your High-Frequency Trading Clients

How AI Will Impact Your High-Frequency Trading Clients

Comments
4 min read
Hakkerin arkivinkki - Vaikka laitteen saa nettiin, sitä ei tarvitse laittaa nettiin

Hakkerin arkivinkki - Vaikka laitteen saa nettiin, sitä ei tarvitse laittaa nettiin

Comments
2 min read
Fix Insufficient Logging & Monitoring in Laravel Easily

Fix Insufficient Logging & Monitoring in Laravel Easily

2
Comments
3 min read
Which is the Best Way to Learn Ethical Hacking in 2025?

Which is the Best Way to Learn Ethical Hacking in 2025?

Comments
4 min read
5 Web Security Flaws That Keep Security Experts Awake at Night: A Journey Through the Dark Side of Web Development

5 Web Security Flaws That Keep Security Experts Awake at Night: A Journey Through the Dark Side of Web Development

Comments
6 min read
Conhecendo OSINT

Conhecendo OSINT

Comments
3 min read
10 Cyber Security & SSL Predictions for 2025

10 Cyber Security & SSL Predictions for 2025

Comments
11 min read
Prevent HTTP Parameter Pollution in Laravel: A Guide

Prevent HTTP Parameter Pollution in Laravel: A Guide

4
Comments
4 min read
Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 2)

Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 2)

Comments
4 min read
Hakkerin arkivinkki - Salasanamanageri

Hakkerin arkivinkki - Salasanamanageri

Comments
2 min read
How to Build a Standout Portfolio in Tech That Attracts Recruiters in 2025

How to Build a Standout Portfolio in Tech That Attracts Recruiters in 2025

3
Comments
3 min read
Defending OAuth2: Advanced Tactics to Block Replay Attacks

Defending OAuth2: Advanced Tactics to Block Replay Attacks

Comments
3 min read
Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
loading...