DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)

Why AI is Becoming Cybersecurity’s Strongest Ally (And Where We’re Headed Next)

Comments
2 min read
Outil de Cybersécurité du Jour - Sep 24, 2025

Outil de Cybersécurité du Jour - Sep 24, 2025

1
Comments
3 min read
10 Best Platforms to Learn Cybersecurity in 2026

10 Best Platforms to Learn Cybersecurity in 2026

Comments 1
5 min read
Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

1
Comments
4 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

3
Comments
8 min read
Why is ZoomEye One of the Most Beginner-Friendly Cyberspace Search Engines?

Why is ZoomEye One of the Most Beginner-Friendly Cyberspace Search Engines?

Comments
2 min read
Top 5 Domain and IP Intelligence Tools in OSINT

Top 5 Domain and IP Intelligence Tools in OSINT

Comments
3 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

4
Comments
9 min read
What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

4
Comments
16 min read
Best Practices for Enhancing Attack Surface Management and Accelerating Vulnerability Response

Best Practices for Enhancing Attack Surface Management and Accelerating Vulnerability Response

Comments
2 min read
Cybersecurity Awareness Month: The Year in Breach

Cybersecurity Awareness Month: The Year in Breach

2
Comments
8 min read
Outil de Cybersécurité du Jour - Sep 23, 2025

Outil de Cybersécurité du Jour - Sep 23, 2025

1
Comments
3 min read
Week 1 / 50 - Cybersecurity Journey - Malware Analysis

Week 1 / 50 - Cybersecurity Journey - Malware Analysis

Comments
3 min read
Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Comments
1 min read
Adaptive Radios: Teaching Machines to Outsmart Signal Jammers

Adaptive Radios: Teaching Machines to Outsmart Signal Jammers

Comments
2 min read
🔒 How Platforms Detect Fake Accounts & Inflated Likes 📊 Instagram, YouTube, Facebook Explained 👀

🔒 How Platforms Detect Fake Accounts & Inflated Likes 📊 Instagram, YouTube, Facebook Explained 👀

4
Comments
3 min read
Protect Your On-Premises Web Application with AWS WAF: A Step-by-Step Guide

Protect Your On-Premises Web Application with AWS WAF: A Step-by-Step Guide

Comments
14 min read
CRITICAL RCE ALERT: Patch CVE-2025-61932 in LANSCOPE Endpoint Manager NOW! (Actively Exploited)

CRITICAL RCE ALERT: Patch CVE-2025-61932 in LANSCOPE Endpoint Manager NOW! (Actively Exploited)

5
Comments
3 min read
Website Hacking Project: From Exploitation to Mitigation

Website Hacking Project: From Exploitation to Mitigation

1
Comments
2 min read
Detect Linux Server Intrusions

Detect Linux Server Intrusions

1
Comments 2
2 min read
Is It Worth Running Your Own Email Server?

Is It Worth Running Your Own Email Server?

Comments
3 min read
CVE-2024-24919: Check Point Quantum Security Gateways Information Disclosure Vulnerability

CVE-2024-24919: Check Point Quantum Security Gateways Information Disclosure Vulnerability

1
Comments
2 min read
DORA Oversight Guide 2025: What JET Will Check

DORA Oversight Guide 2025: What JET Will Check

4
Comments
7 min read
The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder

The Unspoken Rules: Key Insights From My 15-Year Climb from Junior Specialist to Startup Founder

1
Comments
46 min read
Supply Chain Attack: It's 2025 & Let's Learn how to avoid it

Supply Chain Attack: It's 2025 & Let's Learn how to avoid it

Comments
3 min read
loading...