DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
MCA (Moroccan Cyber Alliance) – Join the Future of Cybersecurity

MCA (Moroccan Cyber Alliance) – Join the Future of Cybersecurity

5
Comments
1 min read
Buffer Overflow in Laravel: Causes, Prevention & Fixes

Buffer Overflow in Laravel: Causes, Prevention & Fixes

3
Comments
3 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

6
Comments
4 min read
Understanding Proxy Servers

Understanding Proxy Servers

1
Comments 1
4 min read
Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Comments
6 min read
CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
🚀 API Security in 2025: Are Your APIs Safe?

🚀 API Security in 2025: Are Your APIs Safe?

1
Comments 1
1 min read
Exploring the GenAI Red Teaming Guide

Exploring the GenAI Red Teaming Guide

9
Comments 1
2 min read
From Alert to Action: Investigating a Possible Phishing URL

From Alert to Action: Investigating a Possible Phishing URL

Comments
2 min read
Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

3
Comments
4 min read
Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

Comments 1
4 min read
Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking

Introducing the "WHAT IF" Series: A Deep Dive into the Future of Tech, Cybersecurity, AI, and Hacking

7
Comments 2
2 min read
What is the NIS 2 Directive?

What is the NIS 2 Directive?

Comments
7 min read
NYP Infosec December CTF 2024 writeup!

NYP Infosec December CTF 2024 writeup!

1
Comments
3 min read
Command Injection in Laravel: How to Detect & Prevent It

Command Injection in Laravel: How to Detect & Prevent It

6
Comments
3 min read
Malware Analysis: CryptoLocker

Malware Analysis: CryptoLocker

Comments
3 min read
Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Government and Non-Profit Web Development: Building Accessible and Secure Public Service Websites

Comments
3 min read
New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

13
Comments
5 min read
Decompiling and Debugging with Ghidra

Decompiling and Debugging with Ghidra

11
Comments
4 min read
Conhecendo OSINT

Conhecendo OSINT

1
Comments
3 min read
Quitting After a Decade In: Lessons I am Carrying Over

Quitting After a Decade In: Lessons I am Carrying Over

1
Comments
7 min read
🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀

🚨 Advanced SQL Injection: Exploitation Techniques & Prevention Strategies 🚀

5
Comments
3 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
Data Protection, Privacy, and Ethics in the Data driven Age

Data Protection, Privacy, and Ethics in the Data driven Age

Comments
3 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
loading...