DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Kickstarting Your Cybersecurity Journey: A Beginner’s Guide

Kickstarting Your Cybersecurity Journey: A Beginner’s Guide

Comments
5 min read
Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 1)

Getting Started with AWS SageMaker: Train and Deploy a Model in the Cloud for Cybersecurity Threat Detection (Part 1)

Comments
6 min read
Detailed Guide to Mastering OverTheWire Bandit Game

Detailed Guide to Mastering OverTheWire Bandit Game

6
Comments
9 min read
LDAP Injection in Laravel: Prevention & Secure Coding

LDAP Injection in Laravel: Prevention & Secure Coding

5
Comments
3 min read
WHAT IF #5: Every Social Media Algorithm Was Removed?

WHAT IF #5: Every Social Media Algorithm Was Removed?

14
Comments
2 min read
Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

5
Comments
3 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding CEO Fraud: A Growing Threat to Organisations

Understanding CEO Fraud: A Growing Threat to Organisations

1
Comments
2 min read
Deepfake Technology and Cybersecurity

Deepfake Technology and Cybersecurity

5
Comments
5 min read
Prevent Insecure Deserialization in Laravel: A Comprehensive Guide

Prevent Insecure Deserialization in Laravel: A Comprehensive Guide

2
Comments
3 min read
Pyramid Of Pain

Pyramid Of Pain

1
Comments
2 min read
Path Manipulation in Laravel: Secure Your App from Vulnerabilities

Path Manipulation in Laravel: Secure Your App from Vulnerabilities

2
Comments
3 min read
SSH Hardening Made Easy with OpenSCAP

SSH Hardening Made Easy with OpenSCAP

Comments
4 min read
Market Trends in AI And CyberSecurity in 2025.

Market Trends in AI And CyberSecurity in 2025.

2
Comments 2
3 min read
Why is GRC Important in 2025?

Why is GRC Important in 2025?

Comments
3 min read
đź”’Network Security and Threats: Protecting the Digital World

đź”’Network Security and Threats: Protecting the Digital World

6
Comments
2 min read
Locking Down Your Cloud-Native App with Snyk

Locking Down Your Cloud-Native App with Snyk

Comments
2 min read
The Dual Impact of Agentic AI on Cybersecurity: A Benefit and a Threat

The Dual Impact of Agentic AI on Cybersecurity: A Benefit and a Threat

1
Comments
4 min read
Highest Paying Cybersecurity Certifications in 2025

Highest Paying Cybersecurity Certifications in 2025

Comments
4 min read
WHAT IF #4: Cybersecurity Didn’t Exist?

WHAT IF #4: Cybersecurity Didn’t Exist?

7
Comments
2 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

Comments
3 min read
Building an AI-Driven Penetration Testing Tool.

Building an AI-Driven Penetration Testing Tool.

1
Comments 1
1 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
WHAT IF #2: All Hackers Formed a Global Government?

WHAT IF #2: All Hackers Formed a Global Government?

8
Comments 2
3 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

3
Comments
3 min read
loading...