DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Preventing Race Conditions in Laravel Applications

Preventing Race Conditions in Laravel Applications

3
Comments
3 min read
Transform Your Linux Security: Activate MFA for SSH with Google Authenticator for Unbreakable Protection

Transform Your Linux Security: Activate MFA for SSH with Google Authenticator for Unbreakable Protection

Comments
5 min read
Exploring Zeek: A Powerful Network Security Monitoring Tool

Exploring Zeek: A Powerful Network Security Monitoring Tool

Comments
2 min read
What to Expect in 2025?

What to Expect in 2025?

Comments
9 min read
Fix Insufficient TLS in Laravel: Guide with Free Security Tools

Fix Insufficient TLS in Laravel: Guide with Free Security Tools

2
Comments
3 min read
Quantum Threat: Will Quantum Computers Break Crypto?

Quantum Threat: Will Quantum Computers Break Crypto?

Comments
4 min read
The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

2
Comments
4 min read
Securing Applications with PyTM:A Developer’s Guide to PyTM

Securing Applications with PyTM:A Developer’s Guide to PyTM

Comments
4 min read
Should I Consider Writing a Book? 🤔

Should I Consider Writing a Book? 🤔

5
Comments
1 min read
PayPal Settles Cybersecurity Allegations with NY Regulators for $2M

PayPal Settles Cybersecurity Allegations with NY Regulators for $2M

Comments
4 min read
Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Comments
5 min read
Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine

Monsif Hmouri and Moroccan Black Cyber Army Hack Israeli Channel for Palestine

Comments
2 min read
CORS Misconfigurations in Laravel: Risks and Fixes

CORS Misconfigurations in Laravel: Risks and Fixes

2
Comments
3 min read
Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Comments
5 min read
Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Työkalu - Ubuntu vs Kali

Työkalu - Ubuntu vs Kali

Comments
2 min read
Advantages and Disadvantages of Artificial Intelligence

Advantages and Disadvantages of Artificial Intelligence

Comments
5 min read
Vietnam Launches a Unified Approach to Cyber Threats with Incident Response Alliance

Vietnam Launches a Unified Approach to Cyber Threats with Incident Response Alliance

Comments
2 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
End-To-End Encryption

End-To-End Encryption

Comments
3 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Which is the Best Course for Ethical Hacking?

Which is the Best Course for Ethical Hacking?

1
Comments
4 min read
loading...