DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

The Scariest Threat in Cybersecurity? It Might Be the Person Sitting Next to You

1
Comments
3 min read
Inside the Hacker’s Mindset: How Thinking Like an Attacker Strengthens Your Defense

Inside the Hacker’s Mindset: How Thinking Like an Attacker Strengthens Your Defense

Comments
2 min read
Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Comments
2 min read
Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Comments
2 min read
🛡️ 10 Must-Have Cybersecurity Tools for Freelance Developers in 2025 (Free + Paid)

🛡️ 10 Must-Have Cybersecurity Tools for Freelance Developers in 2025 (Free + Paid)

1
Comments
2 min read
PIPEDA Compliance and Data Security: A Practical Guide for Canadians

PIPEDA Compliance and Data Security: A Practical Guide for Canadians

Comments
3 min read
My First Post

My First Post

Comments
1 min read
Secure Your Site in Minutes: Open-Source WAF With 99%+ Accuracy and Zero Hassle

Secure Your Site in Minutes: Open-Source WAF With 99%+ Accuracy and Zero Hassle

7
Comments
3 min read
These 12 DDoS Attacks Shook the Internet to Its Core

These 12 DDoS Attacks Shook the Internet to Its Core

1
Comments
2 min read
Ransomware Isn’t a File — It’s a Strategy: What Defenders Still Get Wrong

Ransomware Isn’t a File — It’s a Strategy: What Defenders Still Get Wrong

Comments
2 min read
ShieldEye - Automated Vulnerability Scanner

ShieldEye - Automated Vulnerability Scanner

1
Comments
1 min read
Build a SOC simulator using Google AI Studio

Build a SOC simulator using Google AI Studio

7
Comments 1
2 min read
Safeguarding AI at Scale: The Six Security Pillars Behind RunC.AI

Safeguarding AI at Scale: The Six Security Pillars Behind RunC.AI

6
Comments
5 min read
Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It

Drop Your Web App/API & I’ll Run a Free Security Scan (pentesting) on It

1
Comments
1 min read
Understanding Server-Side Request Forgery (SSRF): A Growing Web Security Threat

Understanding Server-Side Request Forgery (SSRF): A Growing Web Security Threat

5
Comments
4 min read
Beginner's Understanding of DAST

Beginner's Understanding of DAST

1
Comments
3 min read
🔐 Why do banks, supposedly the most secure institutions, still use such weak security measures?

🔐 Why do banks, supposedly the most secure institutions, still use such weak security measures?

1
Comments
1 min read
Penetration Testing Firms: 10 Red Flags Every Business Should Know

Penetration Testing Firms: 10 Red Flags Every Business Should Know

1
Comments
22 min read
Zeroize: The Tiny and Memory-Safe Rust Crate

Zeroize: The Tiny and Memory-Safe Rust Crate

1
Comments
2 min read
TryHackMe: DNS in Detail

TryHackMe: DNS in Detail

Comments
2 min read
Why Hackers Want Your Personal Data (And How They Use It)

Why Hackers Want Your Personal Data (And How They Use It)

2
Comments
3 min read
Internet Authentication Service for CyberSecurity

Internet Authentication Service for CyberSecurity

1
Comments
2 min read
AI in Healthcare: Balancing Innovation with Ethical Responsibility

AI in Healthcare: Balancing Innovation with Ethical Responsibility

Comments 1
2 min read
Prevent HTTP Response Splitting in Symfony

Prevent HTTP Response Splitting in Symfony

2
Comments 2
3 min read
Monitoring Robot Network Traffic with Suricata

Monitoring Robot Network Traffic with Suricata

Comments
3 min read
loading...