DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

Reactions 5 Comments
1 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

Reactions 6 Comments
8 min read
The Future of the IoT: the Internet of Behaviors

The Future of the IoT: the Internet of Behaviors

Reactions 3 Comments
4 min read
Scanning for Secrets in Source Code

Scanning for Secrets in Source Code

Reactions 3 Comments
4 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

Reactions 9 Comments
7 min read
File Encrypter and Decrypter

File Encrypter and Decrypter

Reactions 5 Comments
3 min read
Top 8 Security Podcasts for Developers

Top 8 Security Podcasts for Developers

Reactions 5 Comments
9 min read
The State of Medical IoT Security and How to Shield Medical Devices from Cyberattacks

The State of Medical IoT Security and How to Shield Medical Devices from Cyberattacks

Reactions 4 Comments
9 min read
Session Fixation Attacks and Prevention

Session Fixation Attacks and Prevention

Reactions 8 Comments
5 min read
Where (and how) can a web developer learn more about cyber security?

Where (and how) can a web developer learn more about cyber security?

Reactions 11 Comments 2
1 min read
.NET 5: How to authenticate & authorise API's correctly

.NET 5: How to authenticate & authorise API's correctly

Reactions 18 Comments 2
7 min read
Clickjacking Attacks and Prevention

Clickjacking Attacks and Prevention

Reactions 9 Comments
4 min read
Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Reactions 3 Comments
4 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

Reactions 20 Comments
5 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

Reactions 5 Comments
6 min read
MITM (Man-In-The-Middle) Attacks and Prevention

MITM (Man-In-The-Middle) Attacks and Prevention

Reactions 20 Comments 8
6 min read
Is this the future of the Yubikey ?

Is this the future of the Yubikey ?

Reactions 2 Comments 2
1 min read
What are IMSI Catchers and how to evade them

What are IMSI Catchers and how to evade them

Reactions 3 Comments 1
2 min read
Cybersecurity: "Grand-Salting" Proposal

Cybersecurity: "Grand-Salting" Proposal

Reactions 3 Comments
2 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

Reactions 20 Comments 2
1 min read
Nmap Basics

Nmap Basics

Reactions 3 Comments
1 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

Reactions 12 Comments
12 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

Reactions 73 Comments
10 min read
Getting started with Penetration Testing and building your own pentest methodology.

Getting started with Penetration Testing and building your own pentest methodology.

Reactions 3 Comments
27 min read
HSTS Header (Strict Transport Security) Explained

HSTS Header (Strict Transport Security) Explained

Reactions 7 Comments 5
6 min read
Tryhackme Blue

Tryhackme Blue

Reactions 3 Comments
1 min read
Content Security Policy Header: A Complete Guide

Content Security Policy Header: A Complete Guide

Reactions 7 Comments
15 min read
SameSite Cookies and Why You Need Them

SameSite Cookies and Why You Need Them

Reactions 8 Comments
7 min read
Putting Security in DevOps

Putting Security in DevOps

Reactions 1 Comments
1 min read
An Introdution to Networks - A TryHackMe Introductory Networking WriteUp

An Introdution to Networks - A TryHackMe Introductory Networking WriteUp

Reactions 2 Comments
15 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

Reactions 19 Comments 1
5 min read
Python keylogger in 5 minutes

Python keylogger in 5 minutes

Reactions 14 Comments 2
2 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

Reactions 26 Comments
4 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

Reactions 23 Comments
10 min read
CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

Reactions 12 Comments
3 min read
XXE (XML External Entity) Attack & Prevention

XXE (XML External Entity) Attack & Prevention

Reactions 7 Comments
6 min read
How I Documented, Encrypted, and Tested My First REST API

How I Documented, Encrypted, and Tested My First REST API

Reactions 5 Comments
4 min read
Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

Reactions 15 Comments
7 min read
Hack The Box: Phonebook

Hack The Box: Phonebook

Reactions 2 Comments
6 min read
Hack The Box: Templated

Hack The Box: Templated

Reactions 3 Comments
3 min read
Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Reactions 4 Comments
4 min read
Hack The Box: Invite Challenge

Hack The Box: Invite Challenge

Reactions 2 Comments
3 min read
Need Contributors!!!

Need Contributors!!!

Reactions 3 Comments 1
1 min read
Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Reactions 5 Comments
4 min read
Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Reactions 5 Comments
3 min read
Top 10 Extensions You Must Use For Your Privacy

Top 10 Extensions You Must Use For Your Privacy

Reactions 4 Comments
6 min read
Authentication vs. Authorization

Authentication vs. Authorization

Reactions 159 Comments 4
2 min read
Understanding Permissions On Linux

Understanding Permissions On Linux

Reactions 7 Comments 2
3 min read
This is not called Hacking ?

This is not called Hacking ?

Reactions 4 Comments
3 min read
Bypassing Google XSS challenge

Bypassing Google XSS challenge

Reactions 2 Comments
4 min read
Pwnable.kr - Bof: Write-Up (with rizin and pwntools)

Pwnable.kr - Bof: Write-Up (with rizin and pwntools)

Reactions 4 Comments
3 min read
TryHackMe - ToolsRUs WriteUp

TryHackMe - ToolsRUs WriteUp

Reactions 2 Comments
6 min read
Administrative Access Commands On Linux

Administrative Access Commands On Linux

Reactions 8 Comments 1
2 min read
Protegendo seu servidor contra acessos indevidos

Protegendo seu servidor contra acessos indevidos

Reactions 4 Comments
2 min read
ARM shellcode

ARM shellcode

Reactions 3 Comments
2 min read
Wreaking Havoc via an API (with Python code)

Wreaking Havoc via an API (with Python code)

Reactions 5 Comments
5 min read
Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Reactions 13 Comments
3 min read
Common Cyber Attacks

Common Cyber Attacks

Reactions 5 Comments 1
8 min read
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

Reactions 622 Comments 16
7 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

Reactions 42 Comments 3
8 min read
loading...