DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
So They Asked for Your Security Certs — Now What?

So They Asked for Your Security Certs — Now What?

Comments
2 min read
Your Firewall Is Lying to You — Try This Open-Source WAF Instead

Your Firewall Is Lying to You — Try This Open-Source WAF Instead

5
Comments
2 min read
The 1% of Hacking Nobody Talks About… But Should

The 1% of Hacking Nobody Talks About… But Should

1
Comments 3
2 min read
How I Solved a Server-Side Template Injection Challenge (picoCTF Write-up)

How I Solved a Server-Side Template Injection Challenge (picoCTF Write-up)

1
Comments
1 min read
Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Comments 2
3 min read
Your App Is Bleeding Data

Your App Is Bleeding Data

4
Comments
4 min read
🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

12
Comments
4 min read
Clickjacking Prevention in Symfony: Best Practices

Clickjacking Prevention in Symfony: Best Practices

2
Comments
3 min read
AI-Driven Malware & RaaS: Welcome to the Future of Cybercrime 🤖🚀

AI-Driven Malware & RaaS: Welcome to the Future of Cybercrime 🤖🚀

Comments
2 min read
5 Essential Tips to Secure Your Online Presence

5 Essential Tips to Secure Your Online Presence

1
Comments
2 min read
5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

12
Comments 2
3 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
Quantum Computing: Science Revolution or Cybersecurity Threat?

Quantum Computing: Science Revolution or Cybersecurity Threat?

5
Comments
3 min read
The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

1
Comments
5 min read
Countering security threats: Contactless payment

Countering security threats: Contactless payment

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.