DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025

1
Comments
2 min read
What is DNS and how does it work

What is DNS and how does it work

Comments
3 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Comments
4 min read
Penetration Testing vs. Red Teaming

Penetration Testing vs. Red Teaming

1
Comments
4 min read
Top 10 Cybersecurity Projects You Can’t Miss in 2026

Top 10 Cybersecurity Projects You Can’t Miss in 2026

6
Comments
4 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Comments
6 min read
Let's Poison Your LLM Application: A Security Wake-Up Call

Let's Poison Your LLM Application: A Security Wake-Up Call

16
Comments
9 min read
LLM Prompt Injection: Risks, Real Attacks, and Enterprise-Grade Defenses

LLM Prompt Injection: Risks, Real Attacks, and Enterprise-Grade Defenses

Comments
7 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

6
Comments 1
5 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
How Teaching Cybersecurity Changed the Way I See Hackers

How Teaching Cybersecurity Changed the Way I See Hackers

Comments
2 min read
Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

7
Comments 7
6 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.