DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

5
Comments
3 min read
Key Differences Between Vulnerability Assessment and Penetration Testing

Key Differences Between Vulnerability Assessment and Penetration Testing

5
Comments
1 min read
🕵️‍♂️ Inside DeepSeek: Unmasking China's AI-Powered Cyber Offensive in 2025

🕵️‍♂️ Inside DeepSeek: Unmasking China's AI-Powered Cyber Offensive in 2025

1
Comments
3 min read
🔐 June: Password Management Month – Strengthen Your Digital Locks

🔐 June: Password Management Month – Strengthen Your Digital Locks

Comments
2 min read
Rapports d'investigations

Rapports d'investigations

Comments
2 min read
Vite File Read Vulnerability Exposed (CVE-2025-30208)

Vite File Read Vulnerability Exposed (CVE-2025-30208)

6
Comments 1
3 min read
Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Bridging Physical and Digital Risk: Applying Marine Safety Lessons to Tech-Driven Projects

Comments 1
3 min read
🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

🔐 Stop Phishing in Its Tracks: My AI-Powered Phishing Detection Tool 💻🧠

1
Comments
1 min read
Ghost in the Network

Ghost in the Network

Comments
3 min read
🔐 AppArmor and ROS2 – The Article I Tried Not to Write

🔐 AppArmor and ROS2 – The Article I Tried Not to Write

Comments
4 min read
Mastering REST API Authentication: A Developer's Security Handbook

Mastering REST API Authentication: A Developer's Security Handbook

Comments
4 min read
Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Comments
4 min read
Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Top 15 Ethical Hackers in India Who’ve Redefined Cybersecurity [All-Time List]

Comments
2 min read
Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Top 10 Ethical Hackers in India Who Are Transforming Cybersecurity

Comments
2 min read
Best Practices for Creating Strong and Secure Passwords

Best Practices for Creating Strong and Secure Passwords

Comments
4 min read
Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Comments
2 min read
Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Hydra Hands-On: Exploiting Telnet & Attacking FTP Services for Password Cracking

Comments
3 min read
⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

⚠️ Deepfakes, Identity Fraud & AI-Driven Disinformation in 2025

Comments
3 min read
Investigation Report

Investigation Report

1
Comments
1 min read
PIPEDA Compliance and Data Security: A Practical Guide for Canadians

PIPEDA Compliance and Data Security: A Practical Guide for Canadians

Comments
3 min read
My First Post

My First Post

Comments
1 min read
Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Comments
3 min read
What Is a DDoS Attack? Causes, Effects, and Prevention Tips

What Is a DDoS Attack? Causes, Effects, and Prevention Tips

Comments
4 min read
What Is Phishing? Real-Life Examples and Protection Tips

What Is Phishing? Real-Life Examples and Protection Tips

Comments
3 min read
loading...