DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Practical Tips to Protect Your Online Privacy

Practical Tips to Protect Your Online Privacy

1
Comments 1
1 min read
Learning Astro, Offensive Security, and CI/CD

Learning Astro, Offensive Security, and CI/CD

Comments
2 min read
Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Understanding JSON Web Tokens (JWT) for Secure Information Sharing

Comments
4 min read
Hunting Malware Like a Pro: A Beginner's Guide to YARA

Hunting Malware Like a Pro: A Beginner's Guide to YARA

Comments 2
4 min read
Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Tutorial SQL Injection: Panduan Lengkap untuk Pemula

Comments
11 min read
The Coupang Breach Proves We're Asking the Wrong Question About Data Protection

The Coupang Breach Proves We're Asking the Wrong Question About Data Protection

1
Comments
7 min read
Security Incident Report: Cryptominer Attack on Next.js Application

Security Incident Report: Cryptominer Attack on Next.js Application

1
Comments
6 min read
Be the Developer Who’s Ahead of Their Time: Meet pipq, Your New Superpower for Secure Python Development

Be the Developer Who’s Ahead of Their Time: Meet pipq, Your New Superpower for Secure Python Development

Comments
4 min read
Enterprise Architecture for a blog nobody reads

Enterprise Architecture for a blog nobody reads

Comments 1
12 min read
Governance & Regulation | TryHackMe Write-Up

Governance & Regulation | TryHackMe Write-Up

Comments
4 min read
Why VPN Traffic Creates New Security Problems

Why VPN Traffic Creates New Security Problems

Comments 1
3 min read
DEV Track Spotlight: Red Team vs Blue Team - Securing AI Agents (DEV317)

DEV Track Spotlight: Red Team vs Blue Team - Securing AI Agents (DEV317)

1
Comments
5 min read
Telegram Bots Are Useful — But at What Cost to Privacy?

Telegram Bots Are Useful — But at What Cost to Privacy?

Comments 2
3 min read
Why Isn’t True Zero-Trust Encryption Used in Email Systems?

Why Isn’t True Zero-Trust Encryption Used in Email Systems?

Comments
1 min read
My Writeup (0day in Zsh (RCE))

My Writeup (0day in Zsh (RCE))

6
Comments 1
5 min read
Why I switched to an unknown WAF

Why I switched to an unknown WAF

Comments
4 min read
How to Secure Your AI App Against Prompt Injection in 5 Minutes

How to Secure Your AI App Against Prompt Injection in 5 Minutes

Comments
5 min read
Zero Trust Security Explained: Why "Firewalls" Are Dead in 2026

Zero Trust Security Explained: Why "Firewalls" Are Dead in 2026

Comments
1 min read
Top 7 Cybersecurity Certifications to Launch Your Career in 2026

Top 7 Cybersecurity Certifications to Launch Your Career in 2026

Comments
2 min read
Why I Recommend You to Migrate from Cloudflare to SafeLine WAF

Why I Recommend You to Migrate from Cloudflare to SafeLine WAF

Comments
3 min read
ShadowWizardMoneyGang Attack Analysis and Network Fingerprint Extraction

ShadowWizardMoneyGang Attack Analysis and Network Fingerprint Extraction

Comments
4 min read
Without DNS, The Internet Won't Exist

Without DNS, The Internet Won't Exist

6
Comments
8 min read
How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)

How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)

1
Comments
2 min read
Blue Team vs Red Team vs Purple Team

Blue Team vs Red Team vs Purple Team

Comments
2 min read
How to Store Critical Secrets for 100+ Years

How to Store Critical Secrets for 100+ Years

1
Comments 2
3 min read
loading...