DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

Reactions 625 Comments 16
7 min read
Authentication vs. Authorization

Authentication vs. Authorization

Reactions 159 Comments 4
2 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

Reactions 75 Comments
10 min read
A Friendly Introduction to Cybersecurity

A Friendly Introduction to Cybersecurity

Reactions 73 Comments
6 min read
Security tips for APIs & MongoDB

Security tips for APIs & MongoDB

Reactions 68 Comments
2 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

Reactions 48 Comments 2
8 min read
My Journey From Getting Hacked to a Security Consultant (Ethical Hacking)

My Journey From Getting Hacked to a Security Consultant (Ethical Hacking)

Reactions 47 Comments 7
4 min read
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

Reactions 42 Comments
7 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

Reactions 42 Comments 3
8 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

Reactions 37 Comments
3 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

Reactions 36 Comments 1
8 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

Reactions 31 Comments 3
6 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

Reactions 29 Comments 12
3 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

Reactions 28 Comments
4 min read
Cyber Security Introduction (part 3: Man in the Middle )

Cyber Security Introduction (part 3: Man in the Middle )

Reactions 28 Comments
3 min read
Ethical Hacking & Cyber Security Tutorial

Ethical Hacking & Cyber Security Tutorial

Reactions 24 Comments 3
2 min read
Day-9: Bash Scripting - #1

Day-9: Bash Scripting - #1

Reactions 24 Comments
2 min read
Thinking of a career in tech? Look to cybersecurity, first.

Thinking of a career in tech? Look to cybersecurity, first.

Reactions 24 Comments 1
3 min read
what is rainbow table ?

what is rainbow table ?

Reactions 23 Comments 4
1 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

Reactions 23 Comments 5
5 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

Reactions 23 Comments
10 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

Reactions 22 Comments
5 min read
Applications of machine learning in cyber security you need to know about

Applications of machine learning in cyber security you need to know about

Reactions 21 Comments 1
7 min read
Cyber Security Introduction (part 5: Bruteforce)

Cyber Security Introduction (part 5: Bruteforce)

Reactions 20 Comments
4 min read
MITM (Man-In-The-Middle) Attacks and Prevention

MITM (Man-In-The-Middle) Attacks and Prevention

Reactions 20 Comments 8
6 min read
Understanding And Implementing Password Hashing In NodeJS.

Understanding And Implementing Password Hashing In NodeJS.

Reactions 20 Comments 3
6 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

Reactions 20 Comments 2
1 min read
Tips to launch your career in cybersecurity

Tips to launch your career in cybersecurity

Reactions 19 Comments 1
5 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

Reactions 19 Comments 1
5 min read
.NET 5: How to authenticate & authorise API's correctly

.NET 5: How to authenticate & authorise API's correctly

Reactions 18 Comments 2
7 min read
[Stacks 2020 CTF] Voices in the Head - Forensic

[Stacks 2020 CTF] Voices in the Head - Forensic

Reactions 18 Comments 3
5 min read
Before You CTF (Capture the Flag), Get Your Environment Ready

Before You CTF (Capture the Flag), Get Your Environment Ready

Reactions 17 Comments 2
6 min read
Stuffing of Credentials?

Stuffing of Credentials?

Reactions 16 Comments 6
3 min read
The many faces of Cross-Site Scripting

The many faces of Cross-Site Scripting

Reactions 16 Comments
4 min read
[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.

[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.

Reactions 16 Comments
4 min read
Python keylogger in 5 minutes

Python keylogger in 5 minutes

Reactions 16 Comments 2
2 min read
Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Reactions 16 Comments 2
6 min read
Cyber Security Introduction (part 2: Phishing)

Cyber Security Introduction (part 2: Phishing)

Reactions 15 Comments
4 min read
Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

Reactions 15 Comments
7 min read
Linux basic for Cybersecurity

Linux basic for Cybersecurity

Reactions 14 Comments
1 min read
Cyber Security Introduction (part 4: Denial Of Service)

Cyber Security Introduction (part 4: Denial Of Service)

Reactions 14 Comments
4 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

Reactions 14 Comments
11 min read
The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

The Best Pack Of Tools For Cyber Security Students | Lockdoor Framework

Reactions 14 Comments
1 min read
Use Telegram bot as a Penetration Testing Framework

Use Telegram bot as a Penetration Testing Framework

Reactions 14 Comments
4 min read
Go Phish! - Spear Phishing From An Attacker's Point Of View

Go Phish! - Spear Phishing From An Attacker's Point Of View

Reactions 14 Comments 1
4 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

Reactions 13 Comments
2 min read
Little known ways to prevent internet frauds

Little known ways to prevent internet frauds

Reactions 13 Comments
6 min read
Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Reactions 13 Comments
3 min read
Day-1: Understanding Base64

Day-1: Understanding Base64

Reactions 13 Comments 2
2 min read
[UPDATE] FireEye hacked, red team tools leaked.

[UPDATE] FireEye hacked, red team tools leaked.

Reactions 13 Comments
3 min read
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

Reactions 13 Comments
14 min read
Happy Birthday Linux!

Happy Birthday Linux!

Reactions 12 Comments 2
1 min read
Modern cyber security tooling should empower developers

Modern cyber security tooling should empower developers

Reactions 12 Comments
3 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

Reactions 12 Comments
12 min read
Getting started with Penetration Testing!

Getting started with Penetration Testing!

Reactions 12 Comments
4 min read
How to combine Pentest with Automation to improve your security

How to combine Pentest with Automation to improve your security

Reactions 12 Comments 2
1 min read
Password Managers are Safer and More Convenient for You

Password Managers are Safer and More Convenient for You

Reactions 12 Comments 3
14 min read
Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Reactions 12 Comments 1
1 min read
What Are the Top Cybersecurity Certifications and Why Do They Help?

What Are the Top Cybersecurity Certifications and Why Do They Help?

Reactions 12 Comments
5 min read
CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

Reactions 12 Comments
3 min read
loading...