Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
cyberattack
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
20% of internet down: Why X, ChatGPT, and Cloudflare were Down
Aditya Pidurkar
Aditya Pidurkar
Aditya Pidurkar
Follow
Nov 18 '25
20% of internet down: Why X, ChatGPT, and Cloudflare were Down
#
ddos
#
outage
#
cyberattack
#
cloudflare
9
 reactions
Comments
Add Comment
2 min read
How to Protect an Application from Cyber Attacks
Carrie
Carrie
Carrie
Follow
Jul 24 '25
How to Protect an Application from Cyber Attacks
#
cyberattack
#
application
#
security
#
firewall
5
 reactions
Comments
Add Comment
2 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet
Sneha Patil
Sneha Patil
Sneha Patil
Follow
Jun 10 '25
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet
#
cybersecurity
#
socialengineering
#
security
#
cyberattack
Comments
1
 comment
4 min read
Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 29 '25
Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams
#
phishing
#
cyberattack
#
cybersecurity
#
phishingattacks
Comments
Add Comment
5 min read
Understanding DDoS Attacks and Their Impact on Businesses
Anupriya
Anupriya
Anupriya
Follow
Oct 4 '24
Understanding DDoS Attacks and Their Impact on Businesses
#
ddos
#
cyberattack
#
networksecurity
#
digitaldefense
Comments
Add Comment
2 min read
Understanding Cross-Site Request Forgery (CSRF) and Preventing It with SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 10 '24
Understanding Cross-Site Request Forgery (CSRF) and Preventing It with SafeLine WAF
#
opensource
#
webdev
#
cybersecurity
#
cyberattack
19
 reactions
Comments
1
 comment
3 min read
Understanding Cross-Site Scripting (XSS) and Prevent it with SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 10 '24
Understanding Cross-Site Scripting (XSS) and Prevent it with SafeLine WAF
#
cybersecurity
#
cyberattack
#
xss
#
opensource
13
 reactions
Comments
Add Comment
3 min read
6 Powerful Free Security Tools That Will Surprise You
Carrie
Carrie
Carrie
Follow
Oct 9 '24
6 Powerful Free Security Tools That Will Surprise You
#
cybersecurity
#
cyberattack
#
securitytool
#
freetool
10
 reactions
Comments
Add Comment
3 min read
Understanding Recent Cyberattack Trends to Anticipate Future Threats
Anupriya
Anupriya
Anupriya
Follow
Sep 13 '24
Understanding Recent Cyberattack Trends to Anticipate Future Threats
#
threatprotection
#
networksecurity
#
cyberattack
#
cyberdefense
Comments
Add Comment
3 min read
What is a Web Application Gateway
Carrie
Carrie
Carrie
Follow
Sep 30 '24
What is a Web Application Gateway
#
cybersecurity
#
cyberattack
#
webdev
#
beginners
6
 reactions
Comments
Add Comment
2 min read
A Comprehensive Guide to Understand Penetration Testing
Carrie
Carrie
Carrie
Follow
Sep 30 '24
A Comprehensive Guide to Understand Penetration Testing
#
cybersecurity
#
cyberattack
#
beginners
3
 reactions
Comments
Add Comment
4 min read
Beginners' Guide to Understand Web Crawlers and Bots (1)
Carrie
Carrie
Carrie
Follow
Sep 29 '24
Beginners' Guide to Understand Web Crawlers and Bots (1)
#
webdev
#
cybesecurity
#
cyberattack
3
 reactions
Comments
Add Comment
3 min read
Beginners' Guide to Understand Web Crawlers and Bots (2)
Carrie
Carrie
Carrie
Follow
Sep 29 '24
Beginners' Guide to Understand Web Crawlers and Bots (2)
#
webdev
#
cybersecurity
#
cyberattack
#
beginners
2
 reactions
Comments
Add Comment
3 min read
Where Should I Start with Cybersecurity
Carrie
Carrie
Carrie
Follow
Sep 29 '24
Where Should I Start with Cybersecurity
#
cybersecurity
#
webdev
#
cyberattack
3
 reactions
Comments
Add Comment
5 min read
Lessons On Secrets Security From Datadog Research
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Mar 8 '24
Lessons On Secrets Security From Datadog Research
#
data
#
security
#
cyberattack
#
cybersecurity
Comments
Add Comment
8 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account