DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
FaceCheck ID and Friends: Facial Recognition Made Simple for Devs

FaceCheck ID and Friends: Facial Recognition Made Simple for Devs

Comments
4 min read
SafeLine: A Top-Tier WAF Affordable for SMBs Worldwide!

SafeLine: A Top-Tier WAF Affordable for SMBs Worldwide!

5
Comments
3 min read
Quantum Computing and the Web: Joining the Future of Digital Revolution

Quantum Computing and the Web: Joining the Future of Digital Revolution

Comments
4 min read
📘 Cybersecurity Roadmap – A Comprehensive Guide to Begin Your Journey

📘 Cybersecurity Roadmap – A Comprehensive Guide to Begin Your Journey

Comments
1 min read
Exploring the Synergy Between Cyberwarfare and OSINT

Exploring the Synergy Between Cyberwarfare and OSINT

Comments
2 min read
How AI is Reshaping Cybersecurity: The Good, the Bad, and the Future

How AI is Reshaping Cybersecurity: The Good, the Bad, and the Future

Comments
6 min read
DeepSeek’s AI Revolution and Its Impact on the Virtual Desktop Market

DeepSeek’s AI Revolution and Its Impact on the Virtual Desktop Market

Comments
4 min read
What is NAS? Does NAS Need a WAF?

What is NAS? Does NAS Need a WAF?

5
Comments
3 min read
X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

1
Comments
2 min read
One SQL Query That Could Destroy Your Entire Database (And How Hackers Use It)

One SQL Query That Could Destroy Your Entire Database (And How Hackers Use It)

6
Comments
5 min read
Cybersecurity Applications of Image Classification

Cybersecurity Applications of Image Classification

1
Comments
4 min read
The Rise of Fragment Telegram Scams: What You Need to Know

The Rise of Fragment Telegram Scams: What You Need to Know

1
Comments
9 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
How to Install SEToolkit on Termux Without Root (Step-by-Step)

How to Install SEToolkit on Termux Without Root (Step-by-Step)

Comments 4
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
Deepfake Detection in the Digital Age: A Developer's Approach to Authenticity

Deepfake Detection in the Digital Age: A Developer's Approach to Authenticity

Comments
2 min read
What are the main trend in this tech world?

What are the main trend in this tech world?

Comments 1
1 min read
25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

Comments
1 min read
$10 to Get a Powerful, Non-Signature-based WAF

$10 to Get a Powerful, Non-Signature-based WAF

5
Comments
1 min read
How to Create an Architecture with WAF in between Two Nginx

How to Create an Architecture with WAF in between Two Nginx

5
Comments
2 min read
Ranga Premsai Joins Forbes Technology Council: A Step Forward in Cybersecurity Leadership

Ranga Premsai Joins Forbes Technology Council: A Step Forward in Cybersecurity Leadership

Comments
3 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
The Internet’s Roadmap: Discovering Network Routes with Traceroute

The Internet’s Roadmap: Discovering Network Routes with Traceroute

20
Comments
3 min read
Solana Blockchain and Its Use cases

Solana Blockchain and Its Use cases

Comments
4 min read
AI & Blockchain Certifications: The Best Courses for Tech Professionals

AI & Blockchain Certifications: The Best Courses for Tech Professionals

Comments
4 min read
loading...