DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JSON Web Tokens (JWT): Guía Esencial y Buenas Prácticas
Cover image for JSON Web Tokens (JWT): Guía Esencial y Buenas Prácticas

JSON Web Tokens (JWT): Guía Esencial y Buenas Prácticas

Comments
5 min read
Why protect undersea cables?

Why protect undersea cables?

1
Comments
1 min read
🚀 Top Technologies to Learn in 2025
Cover image for 🚀 Top Technologies to Learn in 2025

🚀 Top Technologies to Learn in 2025

3
Comments
3 min read
How to Get Started with Bash Scripting for Automation
Cover image for How to Get Started with Bash Scripting for Automation

How to Get Started with Bash Scripting for Automation

117
Comments 10
3 min read
Is Cisco ISE Worth Learning in 2025?
Cover image for Is Cisco ISE Worth Learning in 2025?

Is Cisco ISE Worth Learning in 2025?

2
Comments
3 min read
Explore Top 10 Cyber Security Threats in 2025
Cover image for Explore Top 10 Cyber Security Threats in 2025

Explore Top 10 Cyber Security Threats in 2025

Comments
7 min read
How to Pass the Cisco CCNA Exam on Your First Attempt
Cover image for How to Pass the Cisco CCNA Exam on Your First Attempt

How to Pass the Cisco CCNA Exam on Your First Attempt

9
Comments 4
3 min read
Eavesdropping Drones

Eavesdropping Drones

Comments
1 min read
5 lý do các startup nên cân nhắc sử dụng Locker.io để quản lý secrets
Cover image for 5 lý do các startup nên cân nhắc sử dụng Locker.io để quản lý secrets

5 lý do các startup nên cân nhắc sử dụng Locker.io để quản lý secrets

2
Comments 1
4 min read
🚀 What is JSON Web Tokens (JWT)? And Why Should Web Developers Care?

🚀 What is JSON Web Tokens (JWT)? And Why Should Web Developers Care?

1
Comments
2 min read
Prevent HTTP Response Splitting in Laravel: Tips & Examples

Prevent HTTP Response Splitting in Laravel: Tips & Examples

2
Comments
3 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):
Cover image for Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
API Security: Vulnerability and Prevention
Cover image for API Security: Vulnerability and Prevention

API Security: Vulnerability and Prevention

Comments
3 min read
Mastering Information Gathering -A foundation
Cover image for Mastering Information Gathering -A foundation

Mastering Information Gathering -A foundation

Comments
3 min read
Comparing VPN Performance: State-of-the-Art Solutions in Stable vs. Unreliable Networks
Cover image for Comparing VPN Performance: State-of-the-Art Solutions in Stable vs. Unreliable Networks

Comparing VPN Performance: State-of-the-Art Solutions in Stable vs. Unreliable Networks

6
Comments 1
8 min read
ARP Poisoning Explained: What It Is and How to Prevent It

ARP Poisoning Explained: What It Is and How to Prevent It

Comments
3 min read
Microsoft Security: A Comprehensive Approach to Digital Protection
Cover image for Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

1
Comments
3 min read
Host Header Injection in Laravel: Risks and Prevention
Cover image for Host Header Injection in Laravel: Risks and Prevention

Host Header Injection in Laravel: Risks and Prevention

5
Comments
3 min read
Building a Smarter Botnet Simulation: The Ultimate Cybersecurity Playground
Cover image for Building a Smarter Botnet Simulation: The Ultimate Cybersecurity Playground

Building a Smarter Botnet Simulation: The Ultimate Cybersecurity Playground

1
Comments
9 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets
Cover image for Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
Ep. 2: Cybersecurity Essentials – Stolen Credentials: The Silent Threat

Ep. 2: Cybersecurity Essentials – Stolen Credentials: The Silent Threat

2
Comments
7 min read
Vulnerability Remediation: The Key to Safeguarding Your Systems and Data
Cover image for Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Vulnerability Remediation: The Key to Safeguarding Your Systems and Data

Comments
3 min read
The Role of AI in Cybersecurity: Opportunities and Challenges
Cover image for The Role of AI in Cybersecurity: Opportunities and Challenges

The Role of AI in Cybersecurity: Opportunities and Challenges

2
Comments
4 min read
How to Install Wireshark on Ubuntu
Cover image for How to Install Wireshark on Ubuntu

How to Install Wireshark on Ubuntu

4
Comments
6 min read
API Vulnerabilities in Laravel: Identify & Secure Your Endpoints
Cover image for API Vulnerabilities in Laravel: Identify & Secure Your Endpoints

API Vulnerabilities in Laravel: Identify & Secure Your Endpoints

3
Comments
3 min read
loading...