DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
O arco-íris da cybersegurança

O arco-íris da cybersegurança

182
Comments 12
4 min read
Building Your Own VPN for Free

Building Your Own VPN for Free

126
Comments 28
3 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

76
Comments 15
8 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

38
Comments 4
6 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

21
Comments 6
2 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Wanna uncover sneaky APIs with us? 🐱‍👤 👀

Wanna uncover sneaky APIs with us? 🐱‍👤 👀

20
Comments
1 min read
Exploring Steganography in the Wild - Part 1

Exploring Steganography in the Wild - Part 1

20
Comments 8
20 min read
Scraping Using Python in Step by step approach

Scraping Using Python in Step by step approach

18
Comments
17 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

18
Comments 3
7 min read
Why Google Zanzibar Shines at Building Authorization

Why Google Zanzibar Shines at Building Authorization

16
Comments
7 min read
Subnetting

Subnetting

15
Comments 3
3 min read
Shadow API Adoption Skyrockets 900%! 🚀

Shadow API Adoption Skyrockets 900%! 🚀

15
Comments 3
2 min read
Ripple Co-Founder Chris Larsen Hacked For $112 Million

Ripple Co-Founder Chris Larsen Hacked For $112 Million

14
Comments 2
2 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

12
Comments
9 min read
Navigating Security and Compliance

Navigating Security and Compliance

12
Comments 2
4 min read
Top 10 Hackers

Top 10 Hackers

12
Comments 11
9 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

12
Comments
6 min read
WebSecurity e a sua importância

WebSecurity e a sua importância

12
Comments 1
5 min read
Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

11
Comments
8 min read
Building a Go Package with Melange and a Docker Image with Apko

Building a Go Package with Melange and a Docker Image with Apko

11
Comments
4 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
Secure database access from web apps

Secure database access from web apps

11
Comments
7 min read
Navigating the Cyber Battlefield: Unmasking Various Types of Online Threats 🤖

Navigating the Cyber Battlefield: Unmasking Various Types of Online Threats 🤖

10
Comments
5 min read
The best application security tool is education

The best application security tool is education

10
Comments
4 min read
Desmontagem e o IDA Pro na Análise de Programas

Desmontagem e o IDA Pro na Análise de Programas

10
Comments
8 min read
Exploit Development: Buffer Overflows

Exploit Development: Buffer Overflows

10
Comments
3 min read
Samsung Passkey Updates: What’s New?

Samsung Passkey Updates: What’s New?

9
Comments
2 min read
Common Web Security Attacks and Top Tips to Protect Your Website

Common Web Security Attacks and Top Tips to Protect Your Website

9
Comments
2 min read
Tutorial: DNS Enumeration using Python

Tutorial: DNS Enumeration using Python

9
Comments 2
3 min read
7 Unique and Underrated Python Libraries

7 Unique and Underrated Python Libraries

9
Comments 6
4 min read
Scanning ports and finding network vulnerabilities using nmap

Scanning ports and finding network vulnerabilities using nmap

9
Comments
7 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

9
Comments
6 min read
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

9
Comments
4 min read
What is Forward Proxy and Reverse Proxy

What is Forward Proxy and Reverse Proxy

9
Comments
2 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

9
Comments 3
12 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
Top Tools for CyberSecurity in 2023

Top Tools for CyberSecurity in 2023

8
Comments
5 min read
The Dark side of Rust programming language

The Dark side of Rust programming language

8
Comments 2
4 min read
Enhancing Cybersecurity with Ruby: A Comprehensive Guide

Enhancing Cybersecurity with Ruby: A Comprehensive Guide

8
Comments
3 min read
PyPI Repository Under Attack: New Users and Package Uploads Temporarily Stopped

PyPI Repository Under Attack: New Users and Package Uploads Temporarily Stopped

8
Comments
2 min read
DLLs in Rust🦀

DLLs in Rust🦀

8
Comments
4 min read
Introduction to OWASP

Introduction to OWASP

8
Comments
2 min read
Explore web applications through their content security policy (CSP)

Explore web applications through their content security policy (CSP)

8
Comments
5 min read
📜 RepoList - A tool to generate wordlists based on GitHub repositories

📜 RepoList - A tool to generate wordlists based on GitHub repositories

8
Comments 1
3 min read
What Is A Hash?

What Is A Hash?

8
Comments
12 min read
Detecting changes in JavaScript and CSS isn't an easy task, Part 3

Detecting changes in JavaScript and CSS isn't an easy task, Part 3

7
Comments
5 min read
Best Practices for Building a Comprehensive Enterprise Data Security Strategy

Best Practices for Building a Comprehensive Enterprise Data Security Strategy

7
Comments
10 min read
First negative user feedback

First negative user feedback

7
Comments
3 min read
A web security story from 2008: silently securing JSON.parse

A web security story from 2008: silently securing JSON.parse

7
Comments 1
5 min read
Vulnerable and Outdated Components

Vulnerable and Outdated Components

7
Comments
4 min read
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784

KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784

7
Comments
4 min read
loading...