DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

Reactions 625 Comments 16
7 min read
Authentication vs. Authorization

Authentication vs. Authorization

Reactions 159 Comments 4
2 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

Reactions 75 Comments
10 min read
A Friendly Introduction to Cybersecurity

A Friendly Introduction to Cybersecurity

Reactions 73 Comments
6 min read
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

Reactions 42 Comments
7 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

Reactions 42 Comments 3
8 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

Reactions 37 Comments
3 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

Reactions 36 Comments 1
8 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

Reactions 29 Comments 12
3 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

Reactions 28 Comments
4 min read
Cyber Security Introduction (part 3: Man in the Middle )

Cyber Security Introduction (part 3: Man in the Middle )

Reactions 28 Comments
3 min read
Day-9: Bash Scripting - #1

Day-9: Bash Scripting - #1

Reactions 24 Comments
2 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

Reactions 23 Comments
10 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

Reactions 23 Comments 5
5 min read
what is rainbow table ?

what is rainbow table ?

Reactions 23 Comments 4
1 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

Reactions 22 Comments
5 min read
Understanding And Implementing Password Hashing In NodeJS.

Understanding And Implementing Password Hashing In NodeJS.

Reactions 20 Comments 3
6 min read
MITM (Man-In-The-Middle) Attacks and Prevention

MITM (Man-In-The-Middle) Attacks and Prevention

Reactions 20 Comments 8
6 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

Reactions 20 Comments 2
1 min read
Cyber Security Introduction (part 5: Bruteforce)

Cyber Security Introduction (part 5: Bruteforce)

Reactions 20 Comments
4 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

Reactions 19 Comments 1
5 min read
[Stacks 2020 CTF] Voices in the Head - Forensic

[Stacks 2020 CTF] Voices in the Head - Forensic

Reactions 18 Comments 3
5 min read
.NET 5: How to authenticate & authorise API's correctly

.NET 5: How to authenticate & authorise API's correctly

Reactions 18 Comments 2
7 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

Reactions 18 Comments
11 min read
[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.

[BREAKING] FireEye hacked, red team tools leaked. Resources to protect yourself.

Reactions 16 Comments
4 min read
Python keylogger in 5 minutes

Python keylogger in 5 minutes

Reactions 16 Comments 2
2 min read
Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Building a QR Code Identity System with Fernet Symmetric Encryption Algorithm in Python

Reactions 16 Comments 2
6 min read
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

Reactions 15 Comments
14 min read
Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

Reactions 15 Comments
7 min read
Cyber Security Introduction (part 2: Phishing)

Cyber Security Introduction (part 2: Phishing)

Reactions 15 Comments
4 min read
Linux basic for Cybersecurity

Linux basic for Cybersecurity

Reactions 14 Comments
1 min read
Cyber Security Introduction (part 4: Denial Of Service)

Cyber Security Introduction (part 4: Denial Of Service)

Reactions 14 Comments
4 min read
[UPDATE] FireEye hacked, red team tools leaked.

[UPDATE] FireEye hacked, red team tools leaked.

Reactions 13 Comments
3 min read
Day-1: Understanding Base64

Day-1: Understanding Base64

Reactions 13 Comments 2
2 min read
Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Reactions 13 Comments
3 min read
Happy Birthday Linux!

Happy Birthday Linux!

Reactions 12 Comments 2
1 min read
CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

Reactions 12 Comments
3 min read
Getting started with Penetration Testing!

Getting started with Penetration Testing!

Reactions 12 Comments
4 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

Reactions 12 Comments
12 min read
Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Reactions 12 Comments 1
1 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

Reactions 11 Comments
7 min read
Phishinder: A phishing detection tool

Phishinder: A phishing detection tool

Reactions 11 Comments
8 min read
Where (and how) can a web developer learn more about cyber security?

Where (and how) can a web developer learn more about cyber security?

Reactions 11 Comments 2
1 min read
QUICK TEN STEP GUIDE TO BUG HUNTING

QUICK TEN STEP GUIDE TO BUG HUNTING

Reactions 10 Comments
3 min read
Clickjacking Attacks and Prevention

Clickjacking Attacks and Prevention

Reactions 9 Comments
4 min read
[Stacks 2020 CTF] Unlock Me - Web

[Stacks 2020 CTF] Unlock Me - Web

Reactions 9 Comments
6 min read
8 free security tools every developer should know and use to Shift Left

8 free security tools every developer should know and use to Shift Left

Reactions 9 Comments
7 min read
Top 8 Security Podcasts for Developers

Top 8 Security Podcasts for Developers

Reactions 9 Comments
9 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

Reactions 9 Comments
6 min read
Crypto miners are killing free CI

Crypto miners are killing free CI

Reactions 9 Comments
3 min read
Introduction to Cybersecurity Journey

Introduction to Cybersecurity Journey

Reactions 9 Comments 2
1 min read
Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Reactions 9 Comments 2
2 min read
The PAss the HAsh AttAck

The PAss the HAsh AttAck

Reactions 8 Comments
3 min read
Day-4: WebSocket! Wait, what???

Day-4: WebSocket! Wait, what???

Reactions 8 Comments
2 min read
Day-3: Bypassing the SOP!💣

Day-3: Bypassing the SOP!💣

Reactions 8 Comments
2 min read
Creating a Windows Project in Visual Studio [Windows PE Internals]

Creating a Windows Project in Visual Studio [Windows PE Internals]

Reactions 8 Comments
1 min read
Administrative Access Commands On Linux

Administrative Access Commands On Linux

Reactions 8 Comments 1
2 min read
Holiday readings in cryptography🎄☃️✨

Holiday readings in cryptography🎄☃️✨

Reactions 8 Comments
2 min read
In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

Reactions 8 Comments
11 min read
SameSite Cookies and Why You Need Them

SameSite Cookies and Why You Need Them

Reactions 8 Comments
7 min read
loading...