DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Multi-Factor Authentication in Azure

Implementing Multi-Factor Authentication in Azure

1
Comments
5 min read
Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Comments
4 min read
The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

1
Comments
3 min read
Inside the Hacker’s Mindset: How Thinking Like an Attacker Strengthens Your Defense

Inside the Hacker’s Mindset: How Thinking Like an Attacker Strengthens Your Defense

Comments
2 min read
Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Comments
2 min read
Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Comments
2 min read
Best Practices for Creating Strong and Secure Passwords

Best Practices for Creating Strong and Secure Passwords

Comments
4 min read
🛡️ 10 Must-Have Cybersecurity Tools for Freelance Developers in 2025 (Free + Paid)

🛡️ 10 Must-Have Cybersecurity Tools for Freelance Developers in 2025 (Free + Paid)

1
Comments
2 min read
Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Comments
2 min read
Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Comments
3 min read
PIPEDA Compliance and Data Security: A Practical Guide for Canadians

PIPEDA Compliance and Data Security: A Practical Guide for Canadians

Comments
3 min read
My First Post

My First Post

Comments
1 min read
Secure Your Site in Minutes: Open-Source WAF With 99%+ Accuracy and Zero Hassle

Secure Your Site in Minutes: Open-Source WAF With 99%+ Accuracy and Zero Hassle

7
Comments
3 min read
These 12 DDoS Attacks Shook the Internet to Its Core

These 12 DDoS Attacks Shook the Internet to Its Core

1
Comments
2 min read
ShieldEye - Automated Vulnerability Scanner

ShieldEye - Automated Vulnerability Scanner

1
Comments
1 min read
Ransomware Isn’t a File — It’s a Strategy: What Defenders Still Get Wrong

Ransomware Isn’t a File — It’s a Strategy: What Defenders Still Get Wrong

Comments
2 min read
Build a SOC simulator using Google AI Studio

Build a SOC simulator using Google AI Studio

7
Comments 1
2 min read
Safeguarding AI at Scale: The Six Security Pillars Behind RunC.AI

Safeguarding AI at Scale: The Six Security Pillars Behind RunC.AI

6
Comments
5 min read
Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Comments
3 min read
Ransomware Explained: How It Works and How to Defend Against It

Ransomware Explained: How It Works and How to Defend Against It

Comments
4 min read
What Is Phishing? Real-Life Examples and Protection Tips

What Is Phishing? Real-Life Examples and Protection Tips

Comments
3 min read
What Is a DDoS Attack? Causes, Effects, and Prevention Tips

What Is a DDoS Attack? Causes, Effects, and Prevention Tips

Comments
4 min read
Common Types of Cyber Attacks and How to Prevent Them

Common Types of Cyber Attacks and How to Prevent Them

Comments
3 min read
Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It

Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It

1
Comments
1 min read
Understanding Server-Side Request Forgery (SSRF): A Growing Web Security Threat

Understanding Server-Side Request Forgery (SSRF): A Growing Web Security Threat

5
Comments
4 min read
loading...