DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
My VAPT Learning Journey

My VAPT Learning Journey

Comments
3 min read
Building a Smarter Botnet Simulation: The Ultimate Cybersecurity Playground

Building a Smarter Botnet Simulation: The Ultimate Cybersecurity Playground

1
Comments
9 min read
Ep. 2: Cybersecurity Essentials – Stolen Credentials: The Silent Threat

Ep. 2: Cybersecurity Essentials – Stolen Credentials: The Silent Threat

Comments
7 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Comments
3 min read
Preventing XML External Entity (XXE) Injection in Laravel Applications

Preventing XML External Entity (XXE) Injection in Laravel Applications

1
Comments
3 min read
The Role of AI in Cybersecurity: Opportunities and Challenges

The Role of AI in Cybersecurity: Opportunities and Challenges

2
Comments
4 min read
How to Install Wireshark on Ubuntu

How to Install Wireshark on Ubuntu

3
Comments
6 min read
API Vulnerabilities in Laravel: Identify & Secure Your Endpoints

API Vulnerabilities in Laravel: Identify & Secure Your Endpoints

3
Comments
3 min read
Nexus Network Testnet: A Revolution in Blockchain and Cybersecurity

Nexus Network Testnet: A Revolution in Blockchain and Cybersecurity

1
Comments
3 min read
How to fix virsh start access error

How to fix virsh start access error

Comments
4 min read
Kaikki julkaisuni vuodelta 2025

Kaikki julkaisuni vuodelta 2025

Comments
1 min read
2025 Cybersecurity Resolutions: How to Tackle Emerging Threats Before They Happen

2025 Cybersecurity Resolutions: How to Tackle Emerging Threats Before They Happen

Comments 1
5 min read
How to Design Robust AI Systems Against Prompt Injection Attacks

How to Design Robust AI Systems Against Prompt Injection Attacks

Comments
3 min read
Remote Code Execution (RCE) in Laravel: Prevention & Example

Remote Code Execution (RCE) in Laravel: Prevention & Example

1
Comments
3 min read
Meow Ransomware: When Cats Aren’t as Cute as They Seem

Meow Ransomware: When Cats Aren’t as Cute as They Seem

1
Comments
4 min read
AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

3
Comments
3 min read
Understanding SSH and Reverse SSH: A Guide for Beginners

Understanding SSH and Reverse SSH: A Guide for Beginners

3
Comments
3 min read
Ep. 1: Cybersecurity Essentials – Vulnerability Management 101

Ep. 1: Cybersecurity Essentials – Vulnerability Management 101

1
Comments
6 min read
A Year of Transformation: Reflecting on 2024's Journey in Tech and Beyond

A Year of Transformation: Reflecting on 2024's Journey in Tech and Beyond

22
Comments
2 min read
Deus in Machina: Pinging Jesus in the Digital Confessional

Deus in Machina: Pinging Jesus in the Digital Confessional

Comments
5 min read
ShadowStrike: A Modern DDoS Testing Tool for Website Security

ShadowStrike: A Modern DDoS Testing Tool for Website Security

6
Comments
2 min read
Developers beware of fake recruiters on linkedIn or The Legend of John (Jack) Hemm

Developers beware of fake recruiters on linkedIn or The Legend of John (Jack) Hemm

2
Comments
5 min read
Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

7
Comments
2 min read
Understanding Firewalls In Cybersecurity

Understanding Firewalls In Cybersecurity

4
Comments 1
3 min read
loading...