DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
RedTiger: Advanced Automated XSS Vulnerability Testing Tool

RedTiger: Advanced Automated XSS Vulnerability Testing Tool

2
Comments 2
4 min read
5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

12
Comments 2
3 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
Quantum Computing: Science Revolution or Cybersecurity Threat?

Quantum Computing: Science Revolution or Cybersecurity Threat?

5
Comments
3 min read
The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

1
Comments
5 min read
Countering security threats: Contactless payment

Countering security threats: Contactless payment

Comments
2 min read
Web Cache Deception Attacks

Web Cache Deception Attacks

Comments
2 min read
✅ CI/CD Penetration Testing Integration Checklist

✅ CI/CD Penetration Testing Integration Checklist

1
Comments
2 min read
Securing Kubernetes Using Honeypots to Detect and Prevent Lateral Movement Attacks

Securing Kubernetes Using Honeypots to Detect and Prevent Lateral Movement Attacks

Comments 1
3 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
What’s the Best Path for a Beginner: Backend Development or Cybersecurity?

What’s the Best Path for a Beginner: Backend Development or Cybersecurity?

Comments
1 min read
Why We Chose SafeLine WAF for Our CTF Challenge Environment

Why We Chose SafeLine WAF for Our CTF Challenge Environment

6
Comments
2 min read
Common SSL Issues and How to Resolve Them

Common SSL Issues and How to Resolve Them

Comments 1
5 min read
BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

BSides Seattle 2025: Rebuilding Trust in Systems In The Age Of NHIs

Comments
7 min read
Solving TryHackMe's "Pickle Rick" Room: A complete Walktrough

Solving TryHackMe's "Pickle Rick" Room: A complete Walktrough

1
Comments
7 min read
Fidenza's Role in Cyberwar: Art, NFTs, and Cybersecurity Convergence

Fidenza's Role in Cyberwar: Art, NFTs, and Cybersecurity Convergence

Comments
8 min read
Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them

Credential Dumping Applications: What They Are, How They Work, and How to Defend Against Them

5
Comments 2
1 min read
How to Resolve 'HSTS Missing from HTTPS Server' Error on Your Website

How to Resolve 'HSTS Missing from HTTPS Server' Error on Your Website

2
Comments
4 min read
Deploying a Static Website on a Custom Domain with HTTPS Using AWS

Deploying a Static Website on a Custom Domain with HTTPS Using AWS

5
Comments
3 min read
Cybersecurity in Digital Trading 🔐📊🛡️

Cybersecurity in Digital Trading 🔐📊🛡️

Comments
2 min read
Expired SSL Certificate? Understand the Impact and Renewal Steps

Expired SSL Certificate? Understand the Impact and Renewal Steps

1
Comments 1
4 min read
Part 2: Mastering SafeLine WAF - Deployment Scenarios & Advanced Protection

Part 2: Mastering SafeLine WAF - Deployment Scenarios & Advanced Protection

9
Comments 2
3 min read
Security training is failing. Here’s what really works.

Security training is failing. Here’s what really works.

1
Comments
4 min read
Securing Digital Interactions: Understanding RSA Encryption

Securing Digital Interactions: Understanding RSA Encryption

Comments
5 min read
Navigating the Cyber Dimensions of CloneX and Digital Assets: A Holistic Examination

Navigating the Cyber Dimensions of CloneX and Digital Assets: A Holistic Examination

Comments
8 min read
loading...