DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔍 Breaking Down XSS – What's Riskier: Stored, Reflected, or DOM? 📉

🔍 Breaking Down XSS – What's Riskier: Stored, Reflected, or DOM? 📉

5
Comments
2 min read
Cyber-safe Digital Space

Cyber-safe Digital Space

1
Comments
2 min read
Embarking on a YouTube Challenge: Python, Django, Cyber Security

Embarking on a YouTube Challenge: Python, Django, Cyber Security

Comments
1 min read
Exploração de Vulnerabilidade

Exploração de Vulnerabilidade

Comments
9 min read
Routing in Computer Networking

Routing in Computer Networking

Comments
8 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

2
Comments
5 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

Comments
5 min read
Non Executable Files in Unix Like Systems

Non Executable Files in Unix Like Systems

Comments
5 min read
How I transformed my career from software engineer to a penetration tester?

How I transformed my career from software engineer to a penetration tester?

Comments
2 min read
[Hack] picoCTF - Mod 26

[Hack] picoCTF - Mod 26

2
Comments 2
1 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
Understanding HTTP and HTTPS: How They Work and Secure Data Transmission

Understanding HTTP and HTTPS: How They Work and Secure Data Transmission

Comments 1
5 min read
How my open source tool got 100 stars in 4 days!

How my open source tool got 100 stars in 4 days!

30
Comments 4
3 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Integrate DEV.to blogs to WordPress site

Integrate DEV.to blogs to WordPress site

Comments
2 min read
Delay-Based Attack Payload

Delay-Based Attack Payload

Comments
2 min read
IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

1
Comments
6 min read
What are Synced Passkeys?

What are Synced Passkeys?

1
Comments
2 min read
Top 5 Ways to Combat Rising OAuth SaaS Attacks

Top 5 Ways to Combat Rising OAuth SaaS Attacks

Comments
2 min read
Serverless Security Best Practices

Serverless Security Best Practices

1
Comments
9 min read
IoT Security Vulnerabilities in Operational Technology: Addressing the Risks

IoT Security Vulnerabilities in Operational Technology: Addressing the Risks

Comments
5 min read
Deciphering the Digital Fortress: Next-Gen Data Security in 2024

Deciphering the Digital Fortress: Next-Gen Data Security in 2024

Comments
3 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

9
Comments
3 min read
TeamPass a Self-hosted Password manager to increase organization’s CyberSecurity

TeamPass a Self-hosted Password manager to increase organization’s CyberSecurity

Comments
2 min read
Self-Paced Online Training for Cyber Security with Expert Support

Self-Paced Online Training for Cyber Security with Expert Support

Comments
3 min read
Adopt AI, But Responsibly!

Adopt AI, But Responsibly!

Comments
10 min read
Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

15
Comments
1 min read
Tools and Methods for Cybersecurity Analysis

Tools and Methods for Cybersecurity Analysis

Comments 2
9 min read
Wazuh-Audit Kubernetes Cluster [RKE2]

Wazuh-Audit Kubernetes Cluster [RKE2]

1
Comments
5 min read
Create a customized identity verification pipeline

Create a customized identity verification pipeline

5
Comments
1 min read
First- & Third Passkey Provider Explained

First- & Third Passkey Provider Explained

Comments
2 min read
Top 10 Cybersecurity Technologies

Top 10 Cybersecurity Technologies

Comments
3 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Why Regular IT Infrastructure Audits Are Essential

Why Regular IT Infrastructure Audits Are Essential

Comments
3 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

1
Comments
3 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
Network Performance

Network Performance

Comments
3 min read
Explore the Avenues of Building a Career in Cyber Security

Explore the Avenues of Building a Career in Cyber Security

3
Comments
3 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

1
Comments
5 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
Command Injection (Course Content)

Command Injection (Course Content)

5
Comments
3 min read
[Book Review] Linux Basics for Hackers by OccupyTheWeb

[Book Review] Linux Basics for Hackers by OccupyTheWeb

Comments
4 min read
PicoCTF 2024: packer

PicoCTF 2024: packer

1
Comments 2
2 min read
The Shocking Discovery of a Backdoor in XZ Utils: A Threat to Internet Systems

The Shocking Discovery of a Backdoor in XZ Utils: A Threat to Internet Systems

Comments 1
3 min read
Propel your Career to New Heights with Cyber Security Courses Online

Propel your Career to New Heights with Cyber Security Courses Online

Comments
3 min read
[Adventure to Cybersecurity] Common DNS records

[Adventure to Cybersecurity] Common DNS records

Comments
2 min read
[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

1
Comments 2
4 min read
[Adventure to Cybersecurity] How DNS Work

[Adventure to Cybersecurity] How DNS Work

Comments
1 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Explained: Gesturejacking and Clickjacking

Explained: Gesturejacking and Clickjacking

2
Comments
3 min read
Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

2
Comments
2 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 1
6 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

1
Comments
6 min read
Unbreakable 2024: secrets-of-winter

Unbreakable 2024: secrets-of-winter

Comments
2 min read
Yet another reason why the xz backdoor is a sneaky b@$tard

Yet another reason why the xz backdoor is a sneaky b@$tard

1
Comments
5 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
loading...