DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Should you STOP using VPN for Security ?

Should you STOP using VPN for Security ?

17
Comments
1 min read
I took advantage of an error in the code of a dating app

I took advantage of an error in the code of a dating app

3
Comments 1
2 min read
5 Reasons to Attend the Ethical Hacking Workshop at IIT Jodhpur Prometeo 2025

5 Reasons to Attend the Ethical Hacking Workshop at IIT Jodhpur Prometeo 2025

1
Comments
3 min read
Best Cyber Security Courses After 12th: 2025 Guide

Best Cyber Security Courses After 12th: 2025 Guide

Comments
3 min read
How to Search Through Multiple Files for Specific Data Using Grep

How to Search Through Multiple Files for Specific Data Using Grep

11
Comments 6
2 min read
Fix Security Misconfigurations in Laravel for Safer Web Apps

Fix Security Misconfigurations in Laravel for Safer Web Apps

Comments
3 min read
AI in Cybersecurity: When Robots Guard Your Wi-Fi ????️????

AI in Cybersecurity: When Robots Guard Your Wi-Fi ????️????

Comments
2 min read
Outdated TLS/SSL in Healthcare: The Open Ransomware Risk

Outdated TLS/SSL in Healthcare: The Open Ransomware Risk

Comments
7 min read
5 Powerful Ways How is Artificial Intelligence Used in Cyber Security

5 Powerful Ways How is Artificial Intelligence Used in Cyber Security

1
Comments
6 min read
Be Careful When Using YAML in Python! There May Be Security Vulnerabilities

Be Careful When Using YAML in Python! There May Be Security Vulnerabilities

4
Comments 1
3 min read
Open Redirects in Laravel: A Critical Guide to Secure Your Application

Open Redirects in Laravel: A Critical Guide to Secure Your Application

3
Comments
3 min read
Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
Integrating AI in Microsoft 365: A Look at Copilot and AI-Driven Features

Integrating AI in Microsoft 365: A Look at Copilot and AI-Driven Features

Comments
3 min read
Best AI Ethical Hacking Course – The Complete Guide

Best AI Ethical Hacking Course – The Complete Guide

2
Comments
4 min read
Cybersecurity Understanding the OWASP® Top 10 Security Threats

Cybersecurity Understanding the OWASP® Top 10 Security Threats

1
Comments
1 min read
Can We Truly Trust VPNs and Anonymity Tools?

Can We Truly Trust VPNs and Anonymity Tools?

6
Comments 1
2 min read
Best Cybersecurity Jobs for Beginners in 2025

Best Cybersecurity Jobs for Beginners in 2025

2
Comments
3 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

15
Comments
1 min read
THREAT INTELLIGENCE

THREAT INTELLIGENCE

Comments
1 min read
Selenium CAPTCHA Bypass: Tokens vs. Clicks — Which One’s Faster?

Selenium CAPTCHA Bypass: Tokens vs. Clicks — Which One’s Faster?

Comments
3 min read
Is Your Laptop Hacked? Here’s How to Find Out!

Is Your Laptop Hacked? Here’s How to Find Out!

10
Comments
1 min read
Caught in the Crunch My Journey from Snacks to 2 Million Exposed Users Privacy

Caught in the Crunch My Journey from Snacks to 2 Million Exposed Users Privacy

17
Comments
3 min read
Prevent Sensitive Data Exposure in Laravel: Best Practices

Prevent Sensitive Data Exposure in Laravel: Best Practices

Comments
3 min read
Perplexity AI User File Uploads Are Unauthenticated!

Perplexity AI User File Uploads Are Unauthenticated!

3
Comments
4 min read
loading...