DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
LDAP Injection in Laravel: Prevention & Secure Coding

LDAP Injection in Laravel: Prevention & Secure Coding

2
Comments
3 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Deepfake Technology and Cybersecurity

Deepfake Technology and Cybersecurity

5
Comments
5 min read
Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

Automate Port Knocking with Dynamic Port Rotation for Secure SSH Access

2
Comments
3 min read
SSH Security Boost: Implementing Port Knocking to Block Unauthorized Access

SSH Security Boost: Implementing Port Knocking to Block Unauthorized Access

Comments
3 min read
Pyramid Of Pain

Pyramid Of Pain

1
Comments
2 min read
Market Trends in AI And CyberSecurity in 2025.

Market Trends in AI And CyberSecurity in 2025.

2
Comments 2
3 min read
Cloud Security Best Practice: A Blueprint for Securing Your Cloud Enviroment

Cloud Security Best Practice: A Blueprint for Securing Your Cloud Enviroment

1
Comments
3 min read
🔒Network Security and Threats: Protecting the Digital World

🔒Network Security and Threats: Protecting the Digital World

1
Comments
2 min read
Locking Down Your Cloud-Native App with Snyk

Locking Down Your Cloud-Native App with Snyk

Comments
2 min read
How to do threat modeling for agile mobile app development?

How to do threat modeling for agile mobile app development?

4
Comments
8 min read
The Dual Impact of Agentic AI on Cybersecurity: A Benefit and a Threat

The Dual Impact of Agentic AI on Cybersecurity: A Benefit and a Threat

1
Comments
4 min read
Highest Paying Cybersecurity Certifications in 2025

Highest Paying Cybersecurity Certifications in 2025

Comments
4 min read
Advanced Search Engines

Advanced Search Engines

Comments
1 min read
WHAT IF #4: Cybersecurity Didn’t Exist?

WHAT IF #4: Cybersecurity Didn’t Exist?

7
Comments
2 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

1
Comments
3 min read
🔐 Angular Security Best Practices: Are You Protecting Your App the Right Way?

🔐 Angular Security Best Practices: Are You Protecting Your App the Right Way?

5
Comments
2 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
Automating Network Packet Capture for an Ethical Hacking Robot

Automating Network Packet Capture for an Ethical Hacking Robot

Comments
3 min read
WHAT IF #2: All Hackers Formed a Global Government?

WHAT IF #2: All Hackers Formed a Global Government?

7
Comments 2
3 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
MCA (Moroccan Cyber Alliance) – Join the Future of Cybersecurity

MCA (Moroccan Cyber Alliance) – Join the Future of Cybersecurity

5
Comments
1 min read
Buffer Overflow in Laravel: Causes, Prevention & Fixes

Buffer Overflow in Laravel: Causes, Prevention & Fixes

3
Comments
3 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

6
Comments
4 min read
loading...