DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
🛡️ Securing ROS2 Robotic Projects with Auditd: A Practical Guide

🛡️ Securing ROS2 Robotic Projects with Auditd: A Practical Guide

Comments 2
5 min read
5-Layer Windows Registry Anomaly Detection Using Python

5-Layer Windows Registry Anomaly Detection Using Python

Comments
1 min read
3-Minute Setup: The Open Source WAF That’s Taking Over GitHub

3-Minute Setup: The Open Source WAF That’s Taking Over GitHub

10
Comments 1
3 min read
SafeLine WAF vs Cloudflare & ModSecurity: Real Benchmark, Real Numbers

SafeLine WAF vs Cloudflare & ModSecurity: Real Benchmark, Real Numbers

6
Comments
3 min read
Enterprise Software Development: Shaping the Future of Technology

Enterprise Software Development: Shaping the Future of Technology

Comments
3 min read
TryHackMe: HTTP in Detail

TryHackMe: HTTP in Detail

Comments
2 min read
Behind the Code: A Simple Look at the Software Supply Chain

Behind the Code: A Simple Look at the Software Supply Chain

Comments
2 min read
Cloud Security – Protecting Innovation at Cloud Speed

Cloud Security – Protecting Innovation at Cloud Speed

Comments
1 min read
What is Web Browser Forensics?

What is Web Browser Forensics?

1
Comments
4 min read
🧨 I've built products that detect fraud better than many banks. And I'm a startup.

🧨 I've built products that detect fraud better than many banks. And I'm a startup.

1
Comments
1 min read
Zero Trust Networks: Why VPNs Are Becoming Obsolete

Zero Trust Networks: Why VPNs Are Becoming Obsolete

Comments
3 min read
Cybersecurity Essentials for the Modern Workplace

Cybersecurity Essentials for the Modern Workplace

1
Comments
1 min read
Securing the Future: How the Agentic AI Approach is Transforming IoT and OT Cybersecurity

Securing the Future: How the Agentic AI Approach is Transforming IoT and OT Cybersecurity

1
Comments
3 min read
ИИ в кибербезопасности: нейросети для аномалий и фишинга, риски и защита

ИИ в кибербезопасности: нейросети для аномалий и фишинга, риски и защита

Comments
2 min read
How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps

How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps

Comments
1 min read
Integrating LDAP into a scalable, secure IAM architecture with Keycloak

Integrating LDAP into a scalable, secure IAM architecture with Keycloak

Comments
5 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

Comments 1
4 min read
The New Battleground of Global Politics

The New Battleground of Global Politics

Comments
6 min read
Cookies Aren’t Just Snacks!

Cookies Aren’t Just Snacks!

Comments
3 min read
Downloaded a Fake App? Your Data’s Already Gone!

Downloaded a Fake App? Your Data’s Already Gone!

Comments
3 min read
Do Red Rooms Really Exist? Unpacking the Dark‑Web Rumor

Do Red Rooms Really Exist? Unpacking the Dark‑Web Rumor

Comments
3 min read
AI as Exploit: The Weaponization of Perception and Authority

AI as Exploit: The Weaponization of Perception and Authority

Comments
39 min read
The Future of Defense: AI and Machine Learning in Zero Trust Architecture

The Future of Defense: AI and Machine Learning in Zero Trust Architecture

Comments
7 min read
The Imperative of AI API Security: Protecting Your Intelligent Systems

The Imperative of AI API Security: Protecting Your Intelligent Systems

Comments
6 min read
loading...