DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Real-Time Attack Monitoring with SafeLine: Setting Up Syslog Integration

Real-Time Attack Monitoring with SafeLine: Setting Up Syslog Integration

7
Comments
2 min read
Why Hackers Don’t Break In - They Log In: The Real Danger of Weak Passwords and Reused Credentials

Why Hackers Don’t Break In - They Log In: The Real Danger of Weak Passwords and Reused Credentials

7
Comments 2
6 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
Your Email Was in a Data Breach :(

Your Email Was in a Data Breach :(

Comments
3 min read
This Is Why Hackers Keep Winning :) Weak Passwords!

This Is Why Hackers Keep Winning :) Weak Passwords!

Comments
3 min read
Prevent Session Fixation in Symfony Securely

Prevent Session Fixation in Symfony Securely

4
Comments
3 min read
Next-Gen WAF for Devs: Why SafeLine WAF Is Gaining 16K+ GitHub Stars

Next-Gen WAF for Devs: Why SafeLine WAF Is Gaining 16K+ GitHub Stars

5
Comments
3 min read
Arbitrary File Read Vulnerability in Vite (CVE-2025-31125)

Arbitrary File Read Vulnerability in Vite (CVE-2025-31125)

9
Comments 3
2 min read
Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Comments
3 min read
Warning Signs Your Phone Might Be Hacked

Warning Signs Your Phone Might Be Hacked

Comments
3 min read
So They Asked for Your Security Certs — Now What?

So They Asked for Your Security Certs — Now What?

Comments
2 min read
Your Firewall Is Lying to You — Try This Open-Source WAF Instead

Your Firewall Is Lying to You — Try This Open-Source WAF Instead

5
Comments
2 min read
Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Comments
2 min read
The 1% of Hacking Nobody Talks About… But Should

The 1% of Hacking Nobody Talks About… But Should

1
Comments 3
2 min read
Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Comments 2
3 min read
Your App Is Bleeding Data

Your App Is Bleeding Data

4
Comments
4 min read
🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

12
Comments
4 min read
Clickjacking Prevention in Symfony: Best Practices

Clickjacking Prevention in Symfony: Best Practices

2
Comments
3 min read
AI-Driven Malware & RaaS: Welcome to the Future of Cybercrime 🤖🚀

AI-Driven Malware & RaaS: Welcome to the Future of Cybercrime 🤖🚀

Comments
2 min read
5 Essential Tips to Secure Your Online Presence

5 Essential Tips to Secure Your Online Presence

1
Comments
2 min read
TryHackMe: Threat Intelligence Tools

TryHackMe: Threat Intelligence Tools

Comments
6 min read
TryHackMe: Yara

TryHackMe: Yara

Comments
10 min read
RedTiger: Advanced Automated XSS Vulnerability Testing Tool

RedTiger: Advanced Automated XSS Vulnerability Testing Tool

1
Comments 2
4 min read
5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

12
Comments 2
3 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
loading...