DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

Comments
6 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Comments
2 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
Fostering Cloud Computing Security

Fostering Cloud Computing Security

Comments
4 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Top 11 Website Security Software Solutions for 2024

Top 11 Website Security Software Solutions for 2024

Comments
10 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
Azure Key Vault

Azure Key Vault

1
Comments
4 min read
Children’s Introduction Guide to Zero Trust

Children’s Introduction Guide to Zero Trust

2
Comments
6 min read
Comprehensive Cybersecurity Bootcamp: Securing the Digital World

Comprehensive Cybersecurity Bootcamp: Securing the Digital World

1
Comments
2 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

2
Comments
3 min read
What is Network Scanning

What is Network Scanning

Comments
4 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
The Role of Emotional Intelligence in Leadership

The Role of Emotional Intelligence in Leadership

3
Comments
5 min read
Mastering Cybersecurity: Moving Beyond Common Mistakes

Mastering Cybersecurity: Moving Beyond Common Mistakes

Comments
2 min read
SQL Injection attack

SQL Injection attack

Comments
2 min read
Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Comments
6 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

4
Comments
3 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Comments
6 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Comments
2 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
GUI vs CLI

GUI vs CLI

3
Comments
2 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Next-Level Methods for Managing Networks Efficiently in 2024

Next-Level Methods for Managing Networks Efficiently in 2024

2
Comments 1
2 min read
Desmontagem e o IDA Pro na Análise de Programas

Desmontagem e o IDA Pro na Análise de Programas

5
Comments
8 min read
Implementing SSL VPN Using FortiGate in AWS Cloud

Implementing SSL VPN Using FortiGate in AWS Cloud

Comments
5 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

21
Comments 6
2 min read
Securing Fedora Linux with SELinux: A Comprehensive Guide

Securing Fedora Linux with SELinux: A Comprehensive Guide

2
Comments
3 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

6
Comments
3 min read
Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Comments
3 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
IAM Vs PAM: What Is The Difference?

IAM Vs PAM: What Is The Difference?

Comments
7 min read
Designing Security Workflows using Gitlab CI Templates

Designing Security Workflows using Gitlab CI Templates

3
Comments
5 min read
Cybersecurity in Tech Era

Cybersecurity in Tech Era

Comments 2
3 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

9
Comments 3
12 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

37
Comments 4
6 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
How Passkeys Enable Invisible MFA

How Passkeys Enable Invisible MFA

5
Comments
2 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
ChiBrrCon IV: Understanding risks and the role of the CISO

ChiBrrCon IV: Understanding risks and the role of the CISO

1
Comments
7 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

2
Comments
3 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

6
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

2
Comments
3 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

5
Comments
4 min read
loading...