DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
🛡️ Examining the Database in SQL Injection Attacks

🛡️ Examining the Database in SQL Injection Attacks

Comments 1
4 min read
VAPT for SaaS Startups: Early Security Investment That Pays Off

VAPT for SaaS Startups: Early Security Investment That Pays Off

Comments
4 min read
Passwords Are a Ticking Timebomb—And These Breaches Prove It

Passwords Are a Ticking Timebomb—And These Breaches Prove It

Comments
2 min read
Cyber Psychology: The Human Factor and Social Engineering

Cyber Psychology: The Human Factor and Social Engineering

Comments
4 min read
Behind the Cloud - The TRUTH About TeraBox.

Behind the Cloud - The TRUTH About TeraBox.

4
Comments
5 min read
Timeline: My Career Shift from Mechanical Engineer to Cybersecurity

Timeline: My Career Shift from Mechanical Engineer to Cybersecurity

Comments
5 min read
How I Automated IP Blacklisting in SafeLine WAF Using the Open API

How I Automated IP Blacklisting in SafeLine WAF Using the Open API

5
Comments 1
3 min read
HPKP: What is HTTP Public Key Pinning?

HPKP: What is HTTP Public Key Pinning?

Comments
5 min read
How to Stand Strong Against Cyberbullying

How to Stand Strong Against Cyberbullying

Comments
3 min read
The Rising Threat of OTP Scams and How to Stay Safe

The Rising Threat of OTP Scams and How to Stay Safe

Comments
3 min read
Incognito Mode Is a Lie Here’s Who Still Sees You

Incognito Mode Is a Lie Here’s Who Still Sees You

Comments
3 min read
How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

Comments
1 min read
Revolutionizing Cybersecurity: CISO Assistant - The One-Stop Shop for Security Management

Revolutionizing Cybersecurity: CISO Assistant - The One-Stop Shop for Security Management

Comments
2 min read
Building Self-Healing SaaS Applications with Django & Frappe

Building Self-Healing SaaS Applications with Django & Frappe

Comments
2 min read
Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Comments
6 min read
Just earned my "Introduction to Cybersecurity" certificate from Cisco Networking Academy!

Just earned my "Introduction to Cybersecurity" certificate from Cisco Networking Academy!

Comments
1 min read
OWASP Top 10 For Flutter — M5: Insecure Communication for Flutter and Dart

OWASP Top 10 For Flutter — M5: Insecure Communication for Flutter and Dart

Comments
1 min read
Fidenza's Role in Cyberwar: The Unlikely Intersection of Art, NFTs, and Cybersecurity

Fidenza's Role in Cyberwar: The Unlikely Intersection of Art, NFTs, and Cybersecurity

Comments
9 min read
How NFTs Work: The Tech Behind the Tokens

How NFTs Work: The Tech Behind the Tokens

Comments
8 min read
Utilizing Aircrack-Ng in Termux: Comprehensive Guide for Wi-Fi Network Security

Utilizing Aircrack-Ng in Termux: Comprehensive Guide for Wi-Fi Network Security

Comments
6 min read
Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Open Source Licensing in Cyber Defense: Navigating Legal and Technical Challenges

Comments
9 min read
Will AI Replace Cybersecurity? The Truth About the Future of Cyber Defense

Will AI Replace Cybersecurity? The Truth About the Future of Cyber Defense

Comments
4 min read
The OPSEC Starter Journal: A Real-World Guide for Beginners

The OPSEC Starter Journal: A Real-World Guide for Beginners

Comments
3 min read
WHO’S IN THE MIDDLE?

WHO’S IN THE MIDDLE?

4
Comments
5 min read
Ashkan Rajaee's Warning: The Remote Hiring Scam No One Talks About (And What You Can Do)

Ashkan Rajaee's Warning: The Remote Hiring Scam No One Talks About (And What You Can Do)

37
Comments 31
3 min read
loading...