DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Built a Security Tool at 2 AM Because Copy-Pasting Commands 50 Times Isn't Learning

I Built a Security Tool at 2 AM Because Copy-Pasting Commands 50 Times Isn't Learning

Comments
6 min read
Forensic Analysis: The Unverified Backend of DIVEXA

Forensic Analysis: The Unverified Backend of DIVEXA

Comments
1 min read
It's Not About Replacing Code Security, It’s About Holding the Line Until Your Code Is Ready

It's Not About Replacing Code Security, It’s About Holding the Line Until Your Code Is Ready

Comments
4 min read
SafeLine: Advanced Open-Source WAF for Modern Web Applications

SafeLine: Advanced Open-Source WAF for Modern Web Applications

Comments
5 min read
Identity Threats in AI-Driven Security: Synthetic Personas and AI-Powered Deception

Identity Threats in AI-Driven Security: Synthetic Personas and AI-Powered Deception

Comments
5 min read
Securing React Application

Securing React Application

Comments
1 min read
How SafeLine WAF Protected a Small Logistics Company’s Website from Cyber Attacks

How SafeLine WAF Protected a Small Logistics Company’s Website from Cyber Attacks

Comments
5 min read
The Federal Government Needs a Technical Bankruptcy, Not Another Security Patch

The Federal Government Needs a Technical Bankruptcy, Not Another Security Patch

Comments
6 min read
Outil de Cybersécurité du Jour - Dec 28, 2025

Outil de Cybersécurité du Jour - Dec 28, 2025

Comments
3 min read
Minutes for Attackers, Weeks for Defenders: Reducing Attack Surface in AWS

Minutes for Attackers, Weeks for Defenders: Reducing Attack Surface in AWS

7
Comments 1
4 min read
SHARD: Deniable File Distribution Through XOR-Based Sharding

SHARD: Deniable File Distribution Through XOR-Based Sharding

Comments
10 min read
Remote Hiring in 2026: What Founders Still Get Wrong About Identity Fraud

Remote Hiring in 2026: What Founders Still Get Wrong About Identity Fraud

27
Comments 4
3 min read
The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

Comments
4 min read
👉 Por que o roteador da operadora não deveria ser o coração da sua rede

👉 Por que o roteador da operadora não deveria ser o coração da sua rede

1
Comments 1
3 min read
"Semantic Chaining" Bypasses Multimodal AI Safety Filters

"Semantic Chaining" Bypasses Multimodal AI Safety Filters

10
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.