DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Comments
2 min read
The 1% of Hacking Nobody Talks About… But Should

The 1% of Hacking Nobody Talks About… But Should

1
Comments 3
2 min read
Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Comments 2
3 min read
Your App Is Bleeding Data

Your App Is Bleeding Data

4
Comments
4 min read
🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

12
Comments
4 min read
Clickjacking Prevention in Symfony: Best Practices

Clickjacking Prevention in Symfony: Best Practices

2
Comments
3 min read
AI-Driven Malware & RaaS: Welcome to the Future of Cybercrime 🤖🚀

AI-Driven Malware & RaaS: Welcome to the Future of Cybercrime 🤖🚀

Comments
2 min read
5 Essential Tips to Secure Your Online Presence

5 Essential Tips to Secure Your Online Presence

1
Comments
2 min read
TryHackMe: Yara

TryHackMe: Yara

Comments
10 min read
RedTiger: Advanced Automated XSS Vulnerability Testing Tool

RedTiger: Advanced Automated XSS Vulnerability Testing Tool

1
Comments 2
4 min read
5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

12
Comments 2
3 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
Quantum Computing: Science Revolution or Cybersecurity Threat?

Quantum Computing: Science Revolution or Cybersecurity Threat?

5
Comments
3 min read
The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

1
Comments
5 min read
Countering security threats: Contactless payment

Countering security threats: Contactless payment

Comments
2 min read
Web Cache Deception Attacks

Web Cache Deception Attacks

Comments
2 min read
✅ CI/CD Penetration Testing Integration Checklist

✅ CI/CD Penetration Testing Integration Checklist

1
Comments
2 min read
Securing Kubernetes Using Honeypots to Detect and Prevent Lateral Movement Attacks

Securing Kubernetes Using Honeypots to Detect and Prevent Lateral Movement Attacks

Comments 1
3 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
What’s the Best Path for a Beginner: Backend Development or Cybersecurity?

What’s the Best Path for a Beginner: Backend Development or Cybersecurity?

Comments
1 min read
Why We Chose SafeLine WAF for Our CTF Challenge Environment

Why We Chose SafeLine WAF for Our CTF Challenge Environment

6
Comments
2 min read
Common SSL Issues and How to Resolve Them

Common SSL Issues and How to Resolve Them

Comments 1
5 min read
BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

Comments
7 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Solving TryHackMe's "Pickle Rick" Room: A complete Walktrough

Solving TryHackMe's "Pickle Rick" Room: A complete Walktrough

1
Comments
7 min read
loading...