DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
Deepfake Detection in the Digital Age: A Developer's Approach to Authenticity

Deepfake Detection in the Digital Age: A Developer's Approach to Authenticity

Comments
2 min read
What are the main trend in this tech world?

What are the main trend in this tech world?

Comments 1
1 min read
25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

25,000$ Bounty — Simple SSRF Led to AWS Credentials Exposure

Comments
1 min read
$10 to Get a Powerful, Non-Signature-based WAF

$10 to Get a Powerful, Non-Signature-based WAF

5
Comments
1 min read
How to Create an Architecture with WAF in between Two Nginx

How to Create an Architecture with WAF in between Two Nginx

5
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Solana Blockchain and Its Use cases

Solana Blockchain and Its Use cases

Comments
4 min read
The Internet’s Roadmap: Discovering Network Routes with Traceroute

The Internet’s Roadmap: Discovering Network Routes with Traceroute

20
Comments
3 min read
AI & Blockchain Certifications: The Best Courses for Tech Professionals

AI & Blockchain Certifications: The Best Courses for Tech Professionals

Comments
4 min read
LetsDefend SIEM Alert: Phising URL Detected - EventID: 86

LetsDefend SIEM Alert: Phising URL Detected - EventID: 86

Comments
5 min read
Securing Flight Paths: A Developer's Guide to Mitigating DDoS Attacks in Aviation

Securing Flight Paths: A Developer's Guide to Mitigating DDoS Attacks in Aviation

Comments
2 min read
Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Comments
1 min read
The Urgent Need for You to Be Security Conscious

The Urgent Need for You to Be Security Conscious

Comments
2 min read
Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Is Your ServiceNow Integration Strategy Up to Date? 5 Surprising Benefits You Didn’t Know

Comments
5 min read
🔬Public docker images Trivy scans as duckdb datas on Kaggle

🔬Public docker images Trivy scans as duckdb datas on Kaggle

Comments 7
1 min read
Bowled Over by Hackers: What Cricket Teaches Us About Cybersecurity 🏏💻

Bowled Over by Hackers: What Cricket Teaches Us About Cybersecurity 🏏💻

Comments 2
2 min read
Discovering DNS: A Beginner’s Introduction to nslookup

Discovering DNS: A Beginner’s Introduction to nslookup

11
Comments
3 min read
Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

Could Drosera Traps Have Prevented Bybit’s $1.4 Billion Hack?

5
Comments
6 min read
Practical SQL Injection Exploitation Cheat Sheet - @verylazytech

Practical SQL Injection Exploitation Cheat Sheet - @verylazytech

5
Comments
3 min read
Khai thác lỗ hổng web tự động bằng AI

Khai thác lỗ hổng web tự động bằng AI

Comments
16 min read
$35,000 Bounty: How Inappropriate Access Control Led to GitLab Account Takeover

$35,000 Bounty: How Inappropriate Access Control Led to GitLab Account Takeover

Comments
1 min read
Strategies for Managing Your Digital Footprint: Protecting Your Online Life

Strategies for Managing Your Digital Footprint: Protecting Your Online Life

1
Comments
3 min read
loading...