DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How NFTs Work: The Tech Behind the Tokens

How NFTs Work: The Tech Behind the Tokens

Comments
8 min read
Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

6
Comments
4 min read
Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Comments
9 min read
Will AI Replace Cybersecurity? The Truth About the Future of Cyber Defense

Will AI Replace Cybersecurity? The Truth About the Future of Cyber Defense

Comments
4 min read
Ghost in the Network

Ghost in the Network

Comments
3 min read
The OPSEC Starter Journal: A Real-World Guide for Beginners

The OPSEC Starter Journal: A Real-World Guide for Beginners

Comments
3 min read
WHO’S IN THE MIDDLE?

WHO’S IN THE MIDDLE?

4
Comments
5 min read
Welcome to my Dev profil 👋

Welcome to my Dev profil 👋

Comments
1 min read
Step-by-Step Tutorial for Lynis on Kali Linux: Installation and Management

Step-by-Step Tutorial for Lynis on Kali Linux: Installation and Management

1
Comments
7 min read
Top 10 Cybersecurity Companies in Dallas

Top 10 Cybersecurity Companies in Dallas

Comments
4 min read
Top 10 Cybersecurity Blog Posts That Made April 2025 a Breakthrough Month for OpenExploit

Top 10 Cybersecurity Blog Posts That Made April 2025 a Breakthrough Month for OpenExploit

Comments
4 min read
Cybersecurity for Small Businesses: A Complete Guide

Cybersecurity for Small Businesses: A Complete Guide

Comments 2
4 min read
Quantum Computing and the Future of Cryptography

Quantum Computing and the Future of Cryptography

Comments
7 min read
When Servers Talk to Strangers: SSRF

When Servers Talk to Strangers: SSRF

4
Comments
4 min read
6 Threat Actors Targeting Face Authentication in 2FA / MFA

6 Threat Actors Targeting Face Authentication in 2FA / MFA

16
Comments
3 min read
What If Your App Becomes a Tool for Scammers?

What If Your App Becomes a Tool for Scammers?

Comments
9 min read
⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

Comments
3 min read
Online vs In-Person Courses: What’s Better for Cybersecurity Training?

Online vs In-Person Courses: What’s Better for Cybersecurity Training?

Comments
2 min read
GitHub Sponsors: Navigating Privacy and Security

GitHub Sponsors: Navigating Privacy and Security

Comments
8 min read
Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Comments
5 min read
Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Understanding Cross-Site Scripting (XSS): How to Detect and Prevent Attacks

Comments
7 min read
Understanding Brute Force Attacks: A Simple Guide to Protecting Your Digital Security

Understanding Brute Force Attacks: A Simple Guide to Protecting Your Digital Security

Comments
5 min read
What is a Denial of Service (DoS) Attack? A Comprehensive Guide

What is a Denial of Service (DoS) Attack? A Comprehensive Guide

Comments
8 min read
Understanding Session Hijacking: Detection, Prevention, and Mitigation

Understanding Session Hijacking: Detection, Prevention, and Mitigation

Comments
6 min read
Understanding SQL Injection: What It Is and How to Protect Your Website

Understanding SQL Injection: What It Is and How to Protect Your Website

Comments
7 min read
loading...