DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How a Growing Web Platform Defeated CC Attacks with Semantic Analysis WAF

How a Growing Web Platform Defeated CC Attacks with Semantic Analysis WAF

Comments
3 min read
How One Team Finally Stopped Application-Layer Attacks with Semantic Analysis

How One Team Finally Stopped Application-Layer Attacks with Semantic Analysis

Comments
3 min read
Cybersecurity tools: SIEM or are companies really spying on us

Cybersecurity tools: SIEM or are companies really spying on us

Comments
7 min read
Building a Virtualized Cybersecurity Lab: Introducing an Adversary with Kali Linux

Building a Virtualized Cybersecurity Lab: Introducing an Adversary with Kali Linux

Comments
5 min read
RiseMyTrip Data Leak: What We Know So Far

RiseMyTrip Data Leak: What We Know So Far

1
Comments
4 min read
LiveShell — Interactive Reverse Shell Generator

LiveShell — Interactive Reverse Shell Generator

5
Comments 1
2 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
Implementing Container Signing in Your CI/CD Pipeline: A DevSecOps Approach with AWS

Implementing Container Signing in Your CI/CD Pipeline: A DevSecOps Approach with AWS

Comments
7 min read
A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

Comments
3 min read
How to Put an End to CC Attacks

How to Put an End to CC Attacks

Comments
4 min read
How SafeLine WAF Protected a Growing Business from Advanced Cybersecurity Threats

How SafeLine WAF Protected a Growing Business from Advanced Cybersecurity Threats

5
Comments 1
5 min read
Cybersecurity ProxyChains: A Mask of Anonymity

Cybersecurity ProxyChains: A Mask of Anonymity

1
Comments
3 min read
How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide

How to Tell if a YouTube Video is a Scam in 2026: The Complete Guide

1
Comments
11 min read
Microsoft Cloud Adoption Framework

Microsoft Cloud Adoption Framework

Comments
1 min read
How we made email authentication actually usable inside editors and AI agents

How we made email authentication actually usable inside editors and AI agents

1
Comments
2 min read
What Kind of Customer Data Do Companies Capture?

What Kind of Customer Data Do Companies Capture?

Comments
5 min read
Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Why I am Writing "11 Controls for Zero Trust architecture in multi-agent AI-to-AI Systems"

Comments
3 min read
Ultimate Container Security Series

Ultimate Container Security Series

Comments
2 min read
Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Release 0.4: Contributing a New Feature to OpenCTI - A Cyber Threat Intelligence Platform

Comments
3 min read
Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Comments
2 min read
Identity Alone Fails in Autonomous Systems

Identity Alone Fails in Autonomous Systems

Comments
1 min read
I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

I Built an EPSS-Integrated CVE Risk Scoring Tool (Day0Predictor v0.1)

Comments
2 min read
Blind Indexing — A Arte de Buscar o que Você Não Pode Ler

Blind Indexing — A Arte de Buscar o que Você Não Pode Ler

Comments
6 min read
When Time Becomes a Security Boundary in AI Systems

When Time Becomes a Security Boundary in AI Systems

Comments
2 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
loading...