Logo
Login
Tech Posts 31215
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Understanding Application Security: Best Practices, Common Threats, and Essential Tools

Understanding Application Security: Best Practices, Common Threats, and Essential Tools
In today's digital world, securing applications is more important than ever. With cyber threats on the rise, every application is a potential target. Whether it's a simple web app or a complex enterpr...
23.04.2025 0 Read More

🛡️ NeoGuardianAI: Building an Advanced URL Phishing Detection System with Machine Learning

In today's digital landscape, phishing attacks remain one of the most prevalent cyber threats, affecting millions of users worldwide. As a developer passionate about cybersecurity and machine learning...
23.04.2025 0 Read More

Understanding Network Security: A Simple Guide for Everyone

Understanding Network Security: A Simple Guide for Everyone
In today’s digital age, where almost everything is connected to the internet, network security has become more important than ever. From personal devices to large corporate networks, keeping informa...
23.04.2025 0 Read More

Mastering Information Gathering: Techniques, Tools, and Best Practices

Mastering Information Gathering: Techniques, Tools, and Best Practices
Information gathering, also known as reconnaissance, is the process of collecting data about a target system or individual before conducting an ethical hacking operation. This is the first and one of ...
23.04.2025 0 Read More

When Servers Talk to Strangers: SSRF

When Servers Talk to Strangers: SSRF
Introduction Imagine sending a letter to your friend, but instead, the mailman reads it and delivers it to someone else without your knowledge. This misdirection is akin to what happens in a ...
03.05.2025 0 Read More

How I Got Into Tech: From Hacking WiFi in 2013 to Building My Online Identity

Back in 2012–2013, I was just a curious kid who loved experimenting with technology. I started exploring ethical hacking using BackTrack, tried phishing with HTML, cracked WiFi passwords, and even h...
04.05.2025 0 Read More

Cybersecurity – Protect What Matters Most

In a world full of digital threats, Cybersecurity isn't a choice—it's a mandate. Whether you're securing hybrid cloud environments or remote workforces, protecting data, systems, and people must com...
23.04.2025 0 Read More

Building AI Agents to Prioritize CVEs — A Google ADK Guide

Building AI Agents to Prioritize CVEs — A Google ADK Guide
In this story, we will create our first AI agents using Agent Development Kit. AI agents will be integrated with Google OSV, MITRE, KEV, and a bit of Google search. AI agents will enrich data about gi...
23.04.2025 0 Read More

How to Create Your Own Home Lab for Hacking

If you aspire to be a penetration tester, ethical hacker, or a cybersecurity professional, you require practice. And the safest way to get hands-on experience is by creating your own home lab for hack...
23.04.2025 0 Read More

Secrets Management in DevOps: Best Practices for Security

Secrets Management in DevOps: Best Practices for Security
In a world of lightning-fast deployments, are you sure your secrets are safe?Secrets—like API keys, database passwords, SSH credentials—are the lifeblood of your infrastructure. But they're also a...
24.04.2025 0 Read More
Loading...
#reading
Swift Descomplicado: Guia Completo para Leigos
0
Ben & Ryan Show Guest Appearance & myCFML
0
Python Malware: How Cybercriminals Use It in 2025
0
Cost Comparison: Databricks Cluster Jobs vs. SQL Warehouse for Batch Processing
0
HTTP Requests
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
How to Run DeepSeek Locally Using Ollama
0