DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Symfony Station CommuniquĂ© — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station CommuniquĂ© — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

2
Comments
10 min read
Symfony Station CommuniquĂ© — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station CommuniquĂ© — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

4
Comments
11 min read
Vaultree SDK, with the world’s first Fully Functional Data-In-Use Encryption is now generally available.

Vaultree SDK, with the world’s first Fully Functional Data-In-Use Encryption is now generally available.

4
Comments
3 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
Symfony Station CommuniquĂ© — 03 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station CommuniquĂ© — 03 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

2
Comments
13 min read
The Importance of Security Operations Center (SOC)

The Importance of Security Operations Center (SOC)

5
Comments
8 min read
Symfony Station CommuniquĂ© — 24 February 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station CommuniquĂ© — 24 February 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

3
Comments
11 min read
Comparing Confidential Computing Alternatives in the Cloud

Comparing Confidential Computing Alternatives in the Cloud

3
Comments 1
4 min read
10 Essential Steps for Web Application Security Testing

10 Essential Steps for Web Application Security Testing

1
Comments
8 min read
Converting string to enum at the cost of 50 GB: CVE-2020-36620

Converting string to enum at the cost of 50 GB: CVE-2020-36620

13
Comments 2
6 min read
Symfony Station CommuniquĂ© — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

Symfony Station CommuniquĂ© — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

3
Comments
12 min read
How severe is the cyber security expert shortage? Which cyber security job shows the most potential for growth?

How severe is the cyber security expert shortage? Which cyber security job shows the most potential for growth?

2
Comments
2 min read
How to Linux with HacktheBox Tool

How to Linux with HacktheBox Tool

3
Comments
3 min read
Introdução ao Linux: comandos båsicos do terminal

Introdução ao Linux: comandos båsicos do terminal

1
Comments
3 min read
Train Url prediction

Train Url prediction

1
Comments
4 min read
Hack Metasploitable machine in 5 ways using Kali Linux đŸ€ŻđŸ˜ˆ

Hack Metasploitable machine in 5 ways using Kali Linux đŸ€ŻđŸ˜ˆ

Comments
5 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
What Does Passwordless Actually Mean?

What Does Passwordless Actually Mean?

2
Comments
2 min read
Symfony Station CommuniquĂ© — 03 February 2023. A look at Symfony, Drupal, PHP, and Cybersecurity News!

Symfony Station CommuniquĂ© — 03 February 2023. A look at Symfony, Drupal, PHP, and Cybersecurity News!

3
Comments
13 min read
Protect Your Website from Blind Cross-Site Scripting

Protect Your Website from Blind Cross-Site Scripting

2
Comments 3
6 min read
Implementing Your Own Time-Based OTP Generator

Implementing Your Own Time-Based OTP Generator

3
Comments
12 min read
NPM Audit: 5 Ways to Use it to Protect Your Code

NPM Audit: 5 Ways to Use it to Protect Your Code

2
Comments
8 min read
Can JavaScript do Everything Python Can?

Can JavaScript do Everything Python Can?

3
Comments
3 min read
HTTP - File Transfers for CTFs and Red-Teamers Pt. 1

HTTP - File Transfers for CTFs and Red-Teamers Pt. 1

Comments
12 min read
Symfony Station CommuniquĂ© — 20 January 2023. A look at Symfony, Drupal, PHP, and Cybersecurity!

Symfony Station CommuniquĂ© — 20 January 2023. A look at Symfony, Drupal, PHP, and Cybersecurity!

4
Comments
11 min read
What are Sql and NoSql Databases?

What are Sql and NoSql Databases?

2
Comments 1
5 min read
Symfony Station CommuniquĂ© — 17 February 2023. A look at Symfony, Drupal, Cybersecurity, and Fediverse news!

Symfony Station CommuniquĂ© — 17 February 2023. A look at Symfony, Drupal, Cybersecurity, and Fediverse news!

2
Comments
10 min read
The Dark Side of ChatGPT: How Scammers are Abusing AI Technology

The Dark Side of ChatGPT: How Scammers are Abusing AI Technology

1
Comments
11 min read
Princípios de Segurança Cibernética

Princípios de Segurança Cibernética

2
Comments
7 min read
10 Best Practices to keep your API secure

10 Best Practices to keep your API secure

4
Comments 1
2 min read
Symfony Station CommuniquĂ© — 27 January 2023. A look at Symfony, Drupal, PHP, and Cybersecurity news!

Symfony Station CommuniquĂ© — 27 January 2023. A look at Symfony, Drupal, PHP, and Cybersecurity news!

5
Comments
12 min read
Unlock the Power of Data Encryption: application-level, database-level, and file-level encryption comparison

Unlock the Power of Data Encryption: application-level, database-level, and file-level encryption comparison

3
Comments
4 min read
Symfony Station CommuniquĂ© — 06 January 2023. A look at Symfony, PHP, and Cybersecurity News!

Symfony Station CommuniquĂ© — 06 January 2023. A look at Symfony, PHP, and Cybersecurity News!

2
Comments
10 min read
Build Your First Port Scanner using Python

Build Your First Port Scanner using Python

9
Comments 6
5 min read
Breaking the Limits of Traditional Cyber Threat Detection with Memgraph

Breaking the Limits of Traditional Cyber Threat Detection with Memgraph

Comments
7 min read
Stay Ahead of Cyber Threats with Graph Databases

Stay Ahead of Cyber Threats with Graph Databases

Comments
9 min read
Docker Best Practices: Security

Docker Best Practices: Security

4
Comments 1
4 min read
$350 XSS in 15 minutes

$350 XSS in 15 minutes

1
Comments
3 min read
SAST: how code analysis tools look for security flaws

SAST: how code analysis tools look for security flaws

Comments
14 min read
Efficient Threat Detection in Cybersecurity with Memgraph

Efficient Threat Detection in Cybersecurity with Memgraph

Comments
5 min read
How I obtained my CISSP

How I obtained my CISSP

1
Comments
4 min read
wazuh agent as a docker image

wazuh agent as a docker image

1
Comments
4 min read
Phishing using Google Ads - An awareness

Phishing using Google Ads - An awareness

2
Comments 2
2 min read
SELinux: Beginner's guide

SELinux: Beginner's guide

28
Comments 4
4 min read
Ultimate Roadmap To Ethical Hacking

Ultimate Roadmap To Ethical Hacking

4
Comments
3 min read
What Is Password Salting & How It Improves Security?

What Is Password Salting & How It Improves Security?

Comments
6 min read
ChatGPT can be used to hack you — Experts warn

ChatGPT can be used to hack you — Experts warn

2
Comments
6 min read
Thinking Like a Hacker: Finding Source Code Leaks on GitHub

Thinking Like a Hacker: Finding Source Code Leaks on GitHub

4
Comments 2
5 min read
Cybersecurity 101 - Part 3

Cybersecurity 101 - Part 3

2
Comments
3 min read
Top 2022 Resources to Sharpen Your DevOps Backup Skill Set

Top 2022 Resources to Sharpen Your DevOps Backup Skill Set

1
Comments
8 min read
Solidity Security: Tips and Tricks for Secure Smart Contract Development

Solidity Security: Tips and Tricks for Secure Smart Contract Development

2
Comments
4 min read
What is Amazon Security Lake? Written by ChatGPT

What is Amazon Security Lake? Written by ChatGPT

2
Comments
2 min read
Deauthentication Attack using Kali Linux

Deauthentication Attack using Kali Linux

2
Comments
3 min read
Using Encryption and Hashing to Increase Security in NestJS

Using Encryption and Hashing to Increase Security in NestJS

Comments
7 min read
how to install assetfinder tool on any linunx distro 🐧

how to install assetfinder tool on any linunx distro 🐧

1
Comments
1 min read
Log Forwarding To Linux

Log Forwarding To Linux

1
Comments
1 min read
BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

6
Comments
3 min read
Discord: The modern breeding grounds for malware 💀

Discord: The modern breeding grounds for malware 💀

5
Comments
2 min read
How Cyber Security is Changing the Way We Develop Websites

How Cyber Security is Changing the Way We Develop Websites

3
Comments 1
6 min read
Steganography : Hide text within an Image file using steghide.

Steganography : Hide text within an Image file using steghide.

6
Comments
2 min read
loading...