DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Art of Not Overthinking: Occam’s Razor for Developers

The Art of Not Overthinking: Occam’s Razor for Developers

10
Comments
3 min read
Frida vs. Obscured WebView: Diagnosing the Path to an iOS CAPTCHA Automation

Frida vs. Obscured WebView: Diagnosing the Path to an iOS CAPTCHA Automation

Comments
7 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

Comments
5 min read
Quantum Computing: Science Revolution or Cybersecurity Threat?

Quantum Computing: Science Revolution or Cybersecurity Threat?

Comments
3 min read
Understanding Networking Commands - Why They Matter

Understanding Networking Commands - Why They Matter

3
Comments
4 min read
We Tested AI Platforms for “Vibe Scamming” - Here’s What Happened

We Tested AI Platforms for “Vibe Scamming” - Here’s What Happened

Comments
1 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

Comments
1 min read
Prevent Cross-Site Scripting (XSS) in Symfony: A Comprehensive Guide

Prevent Cross-Site Scripting (XSS) in Symfony: A Comprehensive Guide

3
Comments 1
3 min read
Silent Intruders

Silent Intruders

Comments
5 min read
CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

Comments
4 min read
The 10 Biggest AI Trends of 2025 Everyone Must Be Ready For Today

The 10 Biggest AI Trends of 2025 Everyone Must Be Ready For Today

Comments
1 min read
From Code to Defense: Understanding Zero Trust as a Developer

From Code to Defense: Understanding Zero Trust as a Developer

10
Comments
2 min read
Abuse OpenID Connect and GitLab for AWS Access.

Abuse OpenID Connect and GitLab for AWS Access.

Comments
10 min read
Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Ransomware Attacks Are Surging — Is Your Business Actually Prepared?

Comments
3 min read
Understanding QUIC and HTTP3 What's the Difference between HTTP2 and HTTP3

Understanding QUIC and HTTP3 What's the Difference between HTTP2 and HTTP3

Comments
4 min read
10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Zero-Trust Security: Buzzword or Cybersecurity Game-Changer?

Comments
2 min read
🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

Comments
2 min read
📘 Cybersecurity Roadmap – A Comprehensive Guide to Begin Your Journey

📘 Cybersecurity Roadmap – A Comprehensive Guide to Begin Your Journey

Comments
1 min read
TryHackMe: Yara

TryHackMe: Yara

Comments
10 min read
TryHackMe: Threat Intelligence Tools

TryHackMe: Threat Intelligence Tools

Comments
6 min read
Countering security threats: Contactless payment

Countering security threats: Contactless payment

Comments
2 min read
Degradación del protocolo de comunicación en IoT mediante un ataque de hombre en el medio (MitM)

Degradación del protocolo de comunicación en IoT mediante un ataque de hombre en el medio (MitM)

Comments
5 min read
Top 7 Dockerfile Security Tips You Should Know

Top 7 Dockerfile Security Tips You Should Know

Comments
3 min read
loading...