DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
First- & Third Passkey Provider Explained

First- & Third Passkey Provider Explained

Comments
2 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Wazuh-Audit Kubernetes Cluster [RKE2]

Wazuh-Audit Kubernetes Cluster [RKE2]

1
Comments
5 min read
Top 10 Cybersecurity Technologies

Top 10 Cybersecurity Technologies

Comments
3 min read
[Book Review] Linux Basics for Hackers by OccupyTheWeb

[Book Review] Linux Basics for Hackers by OccupyTheWeb

Comments
4 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

1
Comments
3 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

Comments
5 min read
Unbreakable 2024: secrets-of-winter

Unbreakable 2024: secrets-of-winter

Comments
2 min read
Yet another reason why the xz backdoor is a sneaky b@$tard

Yet another reason why the xz backdoor is a sneaky b@$tard

1
Comments
5 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
[Adventure to Cybersecurity] Common DNS records

[Adventure to Cybersecurity] Common DNS records

Comments
2 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

1
Comments 2
4 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
PicoCTF 2024- CanYouSee

PicoCTF 2024- CanYouSee

Comments
2 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
SQL Injection - Course Content

SQL Injection - Course Content

Comments
4 min read
Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Comments
2 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024đŸ’»đŸ”

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024đŸ’»đŸ”

Comments
4 min read
Unbreakable 2024: Easy-hide

Unbreakable 2024: Easy-hide

Comments
1 min read
Learning Cyber Security Day 4 - Integrating Encryption in Your Code🔐

Learning Cyber Security Day 4 - Integrating Encryption in Your Code🔐

Comments
3 min read
Trickster- PicoCTF 2024

Trickster- PicoCTF 2024

Comments
2 min read
Beware: Your Browser Might Be Watching You

Beware: Your Browser Might Be Watching You

Comments
2 min read
14 Cybersecurity Awareness Topics You Need to Cover

14 Cybersecurity Awareness Topics You Need to Cover

Comments
7 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
Level Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We Face

Level Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We Face

Comments
2 min read
Penetration Testion, A Guide.

Penetration Testion, A Guide.

Comments
2 min read
Customer Onboarding and Identity Verification APIs

Customer Onboarding and Identity Verification APIs

Comments
2 min read
Explained: Gesturejacking and Clickjacking

Explained: Gesturejacking and Clickjacking

2
Comments
3 min read
Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

2
Comments
2 min read
Navigating the Evolution of AI in Cybersecurity: Insights from Mastercard at #RiskX 2023

Navigating the Evolution of AI in Cybersecurity: Insights from Mastercard at #RiskX 2023

Comments
3 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
Information Disclosure

Information Disclosure

Comments
5 min read
Exploring JavaScript Obfuscation in Web Development and Cybersecurity

Exploring JavaScript Obfuscation in Web Development and Cybersecurity

Comments
3 min read
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Network Performance

Network Performance

Comments
3 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

7
Comments
16 min read
Host your own CTF for free 💾 (CTFd Setup Guide)

Host your own CTF for free 💾 (CTFd Setup Guide)

5
Comments
3 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
Command Injection (Course Content)

Command Injection (Course Content)

5
Comments
3 min read
Loop DOS? Letƛ Discuss.

Loop DOS? Letƛ Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Protection from Cybersecurity: Importance of SSL

Protection from Cybersecurity: Importance of SSL

Comments
3 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

20
Comments
6 min read
Takeaways from SANS 2024 AI Security Trends + Predictions 🔼

Takeaways from SANS 2024 AI Security Trends + Predictions 🔼

Comments
2 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
Tutorial: Add Passkeys to a Remix App

Tutorial: Add Passkeys to a Remix App

1
Comments
2 min read
loading...