DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI is Quietly Changing Everything. Are you Keeping Up?

AI is Quietly Changing Everything. Are you Keeping Up?

Comments
1 min read
EXPOSED! Why Hackers Are Silently Targeting Your Security Misconfigurations

EXPOSED! Why Hackers Are Silently Targeting Your Security Misconfigurations

4
Comments
3 min read
The Sender Policy Framework: Bare Bone Essentials

The Sender Policy Framework: Bare Bone Essentials

6
Comments 2
3 min read
The Double-Edged Sword: AI’s Role in Modern Cybersecurity

The Double-Edged Sword: AI’s Role in Modern Cybersecurity

Comments
1 min read
Resilient Roots, Cloudy Heights: My Cybersecurity Journey from Nigeria

Resilient Roots, Cloudy Heights: My Cybersecurity Journey from Nigeria

1
Comments
3 min read
New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File

New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File

6
Comments 2
2 min read
Another security patch. Another missed opportunity.

Another security patch. Another missed opportunity.

Comments
3 min read
Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor

Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor

3
Comments
4 min read
Exploring Security Risks and Vulnerabilities in Model Context Protocol (MCP): The Emerging Challenge for AI Systems

Exploring Security Risks and Vulnerabilities in Model Context Protocol (MCP): The Emerging Challenge for AI Systems

Comments 2
15 min read
TryHackMe Splunk: Basics

TryHackMe Splunk: Basics

1
Comments
3 min read
Log Aggregation with Python: Bringing Clarity to Distributed Security Data

Log Aggregation with Python: Bringing Clarity to Distributed Security Data

Comments
4 min read
Advancing Python in Cybersecurity: Automation, Threat Detection, and Smarter Scripting

Advancing Python in Cybersecurity: Automation, Threat Detection, and Smarter Scripting

1
Comments 1
4 min read
Building a Log Parser in Python: Turning Raw Logs into Security Insights

Building a Log Parser in Python: Turning Raw Logs into Security Insights

3
Comments
4 min read
What If Compliance Was Cool? Turning ISO into a Competitive Edge

What If Compliance Was Cool? Turning ISO into a Competitive Edge

1
Comments 1
5 min read
Cybersecurity Essentials for the Modern Workplace

Cybersecurity Essentials for the Modern Workplace

1
Comments
1 min read
How i Became a Pentester | Como me Tornei um Pentester

How i Became a Pentester | Como me Tornei um Pentester

1
Comments
5 min read
Salesforce Security Best Practices for Admins in 2025

Salesforce Security Best Practices for Admins in 2025

Comments
1 min read
Taking Python Further in Cybersecurity: Real-World Applications and Projects

Taking Python Further in Cybersecurity: Real-World Applications and Projects

Comments
4 min read
Understanding Black Hat Hackers: Techniques, Impacts, and Prevention

Understanding Black Hat Hackers: Techniques, Impacts, and Prevention

1
Comments
6 min read
Introducing SASTGPT: an AI-powered SAST

Introducing SASTGPT: an AI-powered SAST

Comments
4 min read
What is GRC Compliance and Why It Matters for Businesses

What is GRC Compliance and Why It Matters for Businesses

Comments
2 min read
Honeypots Cyber security

Honeypots Cyber security

Comments
2 min read
OAuth or JWT? Everything Developers Need to Know in 2025

OAuth or JWT? Everything Developers Need to Know in 2025

1
Comments
4 min read
The Basics of Python and Cybersecurity: A Beginner’s Guide

The Basics of Python and Cybersecurity: A Beginner’s Guide

2
Comments 1
4 min read
A Comprehensive Guide to Bug Hunting

A Comprehensive Guide to Bug Hunting

Comments
4 min read
loading...