DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Prevent Path Manipulation Vulnerability in Symfony

Prevent Path Manipulation Vulnerability in Symfony

2
Comments
3 min read
SQL Injection Is Still a Big Deal — Here's How to Stop It

SQL Injection Is Still a Big Deal — Here's How to Stop It

7
Comments 1
2 min read
Comprehensive API Security Testing Services: Protect Your Business from Cyber Threats

Comprehensive API Security Testing Services: Protect Your Business from Cyber Threats

Comments
4 min read
SecurePaste – Encrypted, Self-Destructing Paste with No Logs

SecurePaste – Encrypted, Self-Destructing Paste with No Logs

4
Comments
1 min read
Analyse Packets with Wireshark.

Analyse Packets with Wireshark.

1
Comments
10 min read
Public Wi-Fi Safety: How to Browse Securely on the Go

Public Wi-Fi Safety: How to Browse Securely on the Go

Comments
3 min read
The Silent Shift in Cybersecurity We’re All Part Of

The Silent Shift in Cybersecurity We’re All Part Of

1
Comments
2 min read
LetsDefend.io | SOC202- FakeGPT Malicious Chrome Extension

LetsDefend.io | SOC202- FakeGPT Malicious Chrome Extension

Comments
5 min read
Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

23
Comments 5
3 min read
🔒 Dymo has identified a critical vulnerability affecting the Public Prosecution Office of the Sultanate of Oman

🔒 Dymo has identified a critical vulnerability affecting the Public Prosecution Office of the Sultanate of Oman

1
Comments
1 min read
Generative AI in Action: Real Business Problems, Smarter Solutions

Generative AI in Action: Real Business Problems, Smarter Solutions

Comments
5 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
2 min read
Salesforce Security Best Practices for Admins in 2025

Salesforce Security Best Practices for Admins in 2025

Comments
1 min read
The Future of AI Isn’t Coming ,It’s Already in Your Inbox

The Future of AI Isn’t Coming ,It’s Already in Your Inbox

Comments
5 min read
CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

CPS 234 Compliance in 2025: Essential Steps for Australian Financial Sector Security

Comments
3 min read
What is SD-WAN?

What is SD-WAN?

Comments
3 min read
The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

Comments
5 min read
Web Application Penetration Testing: How to Hack Like a Hacker (Before You Find You)

Web Application Penetration Testing: How to Hack Like a Hacker (Before You Find You)

2
Comments
3 min read
🔐 Data Privacy in 2025 – What Developers & Businesses Must Know

🔐 Data Privacy in 2025 – What Developers & Businesses Must Know

Comments 1
1 min read
Cybersecurity im Immobiliensektor: Schutz vor digitalen Bedrohungen

Cybersecurity im Immobiliensektor: Schutz vor digitalen Bedrohungen

Comments
5 min read
Diary of a Firewall: Facing Thousands of Threats Every Day

Diary of a Firewall: Facing Thousands of Threats Every Day

Comments
3 min read
🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible

🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible

Comments
2 min read
Advanced Web Security Best Practices: Securing Your Web Apps against Today's Threats

Advanced Web Security Best Practices: Securing Your Web Apps against Today's Threats

1
Comments
3 min read
Master Real-World Attack Detection with This Open Source WAF

Master Real-World Attack Detection with This Open Source WAF

7
Comments 1
3 min read
The Ultimate Guide to SSH Hardening: Secure Your Remote Access

The Ultimate Guide to SSH Hardening: Secure Your Remote Access

1
Comments
4 min read
loading...