DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

632
Comments 16
7 min read
Please remove that .git folder

Please remove that .git folder

296
Comments 42
2 min read
Gaining remote access to a computer with a reverse shell attack in Node.js

Gaining remote access to a computer with a reverse shell attack in Node.js

286
Comments 11
9 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

182
Comments 12
4 min read
Authentication vs. Authorization

Authentication vs. Authorization

162
Comments 4
2 min read
Simple Commands in Linux That Will Make You Feel Like a Pro

Simple Commands in Linux That Will Make You Feel Like a Pro

161
Comments 1
4 min read
11 Security tips to protect your website

11 Security tips to protect your website

133
Comments 11
6 min read
Building Your Own VPN for Free

Building Your Own VPN for Free

127
Comments 28
3 min read
How healthcare organizations can take an agile approach towards cloud security controls?

How healthcare organizations can take an agile approach towards cloud security controls?

111
Comments 26
4 min read
Please remove that .DS_Store

Please remove that .DS_Store

99
Comments 18
2 min read
A Friendly Introduction to Cybersecurity

A Friendly Introduction to Cybersecurity

94
Comments
6 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

81
Comments
10 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

80
Comments 16
8 min read
Security tips for APIs & MongoDB

Security tips for APIs & MongoDB

67
Comments
2 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

64
Comments
4 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
What does 2022 have in store for cybersecurity and cloud security specialists?

What does 2022 have in store for cybersecurity and cloud security specialists?

57
Comments
7 min read
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

57
Comments 1
7 min read
So you think your password is strong

So you think your password is strong

56
Comments 21
2 min read
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

52
Comments
14 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

48
Comments 2
8 min read
Understanding And Implementing Password Hashing In NodeJS.

Understanding And Implementing Password Hashing In NodeJS.

48
Comments 5
6 min read
Forging GraphQL Bombs, the 2022 version of Zip Bombs

Forging GraphQL Bombs, the 2022 version of Zip Bombs

47
Comments 2
4 min read
5 API testing tools

5 API testing tools

46
Comments
4 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

45
Comments 2
8 min read
Cyber Security: A run through.

Cyber Security: A run through.

44
Comments 6
6 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

43
Comments 3
8 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

40
Comments
3 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

40
Comments
11 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

38
Comments 4
6 min read
The Things to Keep in Mind about Auth

The Things to Keep in Mind about Auth

36
Comments
8 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Open source API Security testing tools

Open source API Security testing tools

31
Comments 1
2 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Tips to launch your career in cybersecurity

Tips to launch your career in cybersecurity

30
Comments 1
5 min read
ENV vars and security

ENV vars and security

29
Comments
4 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

29
Comments 12
3 min read
Cyber Security Introduction (part 3: Man in the Middle )

Cyber Security Introduction (part 3: Man in the Middle )

28
Comments
3 min read
Crap, we might have installed a malicious dependency...

Crap, we might have installed a malicious dependency...

28
Comments 4
3 min read
How do you perform API testing?

How do you perform API testing?

26
Comments
2 min read
Introduction to Cybersecurity Tools & Cyber Attacks

Introduction to Cybersecurity Tools & Cyber Attacks

26
Comments 1
6 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

25
Comments 7
2 min read
Thinking of a career in tech? Look to cybersecurity, first.

Thinking of a career in tech? Look to cybersecurity, first.

24
Comments 1
3 min read
Day-9: Bash Scripting - #1

Day-9: Bash Scripting - #1

24
Comments
2 min read
8 Most Common Type Of Cyber Attacks

8 Most Common Type Of Cyber Attacks

24
Comments 2
3 min read
My jounrey into API Security

My jounrey into API Security

23
Comments
2 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

23
Comments 5
5 min read
When to use AWS Credentials

When to use AWS Credentials

23
Comments
5 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
How an overlook in development wreaked havoc on the internet - The Log4Shell Vulnerability

How an overlook in development wreaked havoc on the internet - The Log4Shell Vulnerability

23
Comments 6
5 min read
what is rainbow table ?

what is rainbow table ?

23
Comments 4
1 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

23
Comments
10 min read
How are API security testing tools different from website security testing?

How are API security testing tools different from website security testing?

23
Comments
3 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

22
Comments
5 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Getting started with Penetration Testing!

Getting started with Penetration Testing!

22
Comments 1
4 min read
Building a Cybersecurity Game with Three.js - Inspired by Google’s Interland

Building a Cybersecurity Game with Three.js - Inspired by Google’s Interland

22
Comments 5
3 min read
loading...