DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Did you know what DevOps Security (DS) is ??

Did you know what DevOps Security (DS) is ??

Comments 1
1 min read
Understanding the 11 Most Common Types of Cyber Attacks

Understanding the 11 Most Common Types of Cyber Attacks

Comments 1
2 min read
How to Plan a Corporate Data Migration to the Cloud with Security and High Availability

How to Plan a Corporate Data Migration to the Cloud with Security and High Availability

Comments
2 min read
When AI Models Gossip: What One Model Thinks About Another

When AI Models Gossip: What One Model Thinks About Another

1
Comments
8 min read
The Business-First Approach to Cybersecurity: Why Technical Excellence Isn't Enough in 2025

The Business-First Approach to Cybersecurity: Why Technical Excellence Isn't Enough in 2025

Comments 1
4 min read
The Ultimate Guide to Cyber Threat Actors: Exploring Hackers, Hacktivists, and Their Tactics

The Ultimate Guide to Cyber Threat Actors: Exploring Hackers, Hacktivists, and Their Tactics

Comments
6 min read
Who is 5hezy?

Who is 5hezy?

Comments
2 min read
Key Differences Between Vulnerability Assessment and Penetration Testing

Key Differences Between Vulnerability Assessment and Penetration Testing

5
Comments
1 min read
🕵️‍♂️ Inside DeepSeek: Unmasking China's AI-Powered Cyber Offensive in 2025

🕵️‍♂️ Inside DeepSeek: Unmasking China's AI-Powered Cyber Offensive in 2025

2
Comments
3 min read
🛡️ Examining the Database in SQL Injection Attacks

🛡️ Examining the Database in SQL Injection Attacks

Comments 1
4 min read
Passwords Are a Ticking Timebomb—And These Breaches Prove It

Passwords Are a Ticking Timebomb—And These Breaches Prove It

Comments
2 min read
Cyber Psychology: The Human Factor and Social Engineering

Cyber Psychology: The Human Factor and Social Engineering

Comments
4 min read
Behind the Cloud - The TRUTH About TeraBox.

Behind the Cloud - The TRUTH About TeraBox.

4
Comments
5 min read
Timeline: My Career Shift from Mechanical Engineer to Cybersecurity

Timeline: My Career Shift from Mechanical Engineer to Cybersecurity

Comments
5 min read
RedTiger: Advanced Automated XSS Vulnerability Testing Tool

RedTiger: Advanced Automated XSS Vulnerability Testing Tool

3
Comments 2
4 min read
HPKP: What is HTTP Public Key Pinning?

HPKP: What is HTTP Public Key Pinning?

Comments
5 min read
How I Automated IP Blacklisting in SafeLine WAF Using the Open API

How I Automated IP Blacklisting in SafeLine WAF Using the Open API

6
Comments 1
3 min read
How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

Comments
1 min read
Investigation Report

Investigation Report

1
Comments
1 min read
Rapports d'investigations

Rapports d'investigations

Comments
2 min read
Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Comments
6 min read
Fidenza's Role in Cyberwar: The Unlikely Intersection of Art, NFTs, and Cybersecurity

Fidenza's Role in Cyberwar: The Unlikely Intersection of Art, NFTs, and Cybersecurity

Comments
9 min read
How NFTs Work: The Tech Behind the Tokens

How NFTs Work: The Tech Behind the Tokens

Comments
8 min read
Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

6
Comments
4 min read
Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Comments
9 min read
loading...