DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
MCA (Moroccan Cyber Alliance) – Join the Future of Cybersecurity

MCA (Moroccan Cyber Alliance) – Join the Future of Cybersecurity

6
Comments
1 min read
MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
🚀 API Security in 2025: Are Your APIs Safe?

🚀 API Security in 2025: Are Your APIs Safe?

1
Comments 1
1 min read
Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

4
Comments 1
4 min read
Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking

Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking

11
Comments 2
2 min read
Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

5
Comments
4 min read
From Alert to Action: Investigating a Possible Phishing URL

From Alert to Action: Investigating a Possible Phishing URL

Comments
2 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
What is the NIS 2 Directive?

What is the NIS 2 Directive?

Comments
7 min read
Command Injection in Laravel: How to Detect & Prevent It

Command Injection in Laravel: How to Detect & Prevent It

9
Comments
3 min read
NYP Infosec December CTF 2024 writeup!

NYP Infosec December CTF 2024 writeup!

1
Comments
3 min read
Malware Analysis: CryptoLocker

Malware Analysis: CryptoLocker

Comments
3 min read
Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Comments
3 min read
New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

13
Comments
5 min read
Decompiling and Debugging with Ghidra

Decompiling and Debugging with Ghidra

1
Comments
4 min read
Quitting After a Decade In: Lessons I am Carrying Over

Quitting After a Decade In: Lessons I am Carrying Over

1
Comments
7 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance

The Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and Compliance

Comments
2 min read
Top Cybersecurity Trends for 2025 and How to Stay Ahead

Top Cybersecurity Trends for 2025 and How to Stay Ahead

1
Comments
3 min read
Docker Security: Essential Practices for Securing Your Containers

Docker Security: Essential Practices for Securing Your Containers

2
Comments
3 min read
Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool

Introducing AsmJamShield: A Professional-Grade Cybersecurity Tool

5
Comments
3 min read
What to Expect in 2025?

What to Expect in 2025?

Comments 1
9 min read
Quantum Threat: Will Quantum Computers Break Crypto?

Quantum Threat: Will Quantum Computers Break Crypto?

Comments
4 min read
Fix Insufficient TLS in Laravel: Guide with Free Security Tools

Fix Insufficient TLS in Laravel: Guide with Free Security Tools

4
Comments
3 min read
The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

4
Comments
4 min read
loading...