DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

5
Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

5
Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

5
Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

5
Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

5
Comments
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

6
Comments
3 min read
Data Privacy and GDPR: How to Make Your Web Apps Comply with the Privacy Laws

Data Privacy and GDPR: How to Make Your Web Apps Comply with the Privacy Laws

Comments
4 min read
My Portfolio

My Portfolio

Comments
1 min read
OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

7
Comments 1
3 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

6
Comments 1
3 min read
Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

Comments
1 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

6
Comments
3 min read
Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

Comments
5 min read
🔐 Information Security and Data Privacy: Protect Your Online Information

🔐 Information Security and Data Privacy: Protect Your Online Information

1
Comments
3 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
What is Software Defined Networking (SDN)?

What is Software Defined Networking (SDN)?

Comments
3 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

Comments
2 min read
The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments
3 min read
HTTPS and SSLs: Why They Matter, How to Use Them

HTTPS and SSLs: Why They Matter, How to Use Them

Comments
5 min read
Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

Comments
10 min read
A walkthrough to Sofia Santos' OSINT Exercise #001

A walkthrough to Sofia Santos' OSINT Exercise #001

1
Comments
3 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Comments
5 min read
Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Comments
6 min read
Building a Simple Image Encryption Tool Using Python

Building a Simple Image Encryption Tool Using Python

Comments
4 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

Comments
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

Comments
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

Comments
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

Comments
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

Comments
3 min read
What Is Packet Sniffing?

What Is Packet Sniffing?

Comments
3 min read
Networking in Cybersecurity: The Essential Guide to Protecting Your Digital Infrastructure

Networking in Cybersecurity: The Essential Guide to Protecting Your Digital Infrastructure

Comments
1 min read
AI-Powered Ethical Hacking: Automating Penetration Testing in DevSecOps

AI-Powered Ethical Hacking: Automating Penetration Testing in DevSecOps

Comments
2 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

16
Comments 2
3 min read
Who is a Hacker?

Who is a Hacker?

5
Comments
8 min read
Implementing a Caesar Cipher Program in Python

Implementing a Caesar Cipher Program in Python

1
Comments
4 min read
Essential SecOps Practices Every Developer Should Know

Essential SecOps Practices Every Developer Should Know

Comments
5 min read
Ansible and Cybersecurity

Ansible and Cybersecurity

Comments
3 min read
Passwords: Are they going extinct?

Passwords: Are they going extinct?

5
Comments
6 min read
New Vulnerability Scanner (Must Try)

New Vulnerability Scanner (Must Try)

5
Comments
1 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
Cybersecurity Awareness Month: Stay Safe Online

Cybersecurity Awareness Month: Stay Safe Online

Comments
3 min read
Security is Usability — Examining Cybersecurity Erosion

Security is Usability — Examining Cybersecurity Erosion

Comments
8 min read
Another Blog Drop: Let's Dive Deep into C# Code Review with EasySharp by TryCrack.me ...... ⚡️📷

Another Blog Drop: Let's Dive Deep into C# Code Review with EasySharp by TryCrack.me ...... ⚡️📷

Comments
1 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Comments
2 min read
Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Comments
1 min read
Cybersecurity 101: Securing Your Personal Data Like a Pro

Cybersecurity 101: Securing Your Personal Data Like a Pro

1
Comments
5 min read
Jenkins File Read Vulnerability - CVE-2024-23897

Jenkins File Read Vulnerability - CVE-2024-23897

2
Comments
2 min read
What is the Principle of Least Privilege?

What is the Principle of Least Privilege?

Comments
2 min read
Data Protection in the Digital Age

Data Protection in the Digital Age

Comments
6 min read
Top 5 Cybersecurity Certifications to Boost Your Career

Top 5 Cybersecurity Certifications to Boost Your Career

5
Comments
2 min read
Scrambled EXIF: Remove Metadata From Your Media In A Blink!

Scrambled EXIF: Remove Metadata From Your Media In A Blink!

7
Comments
3 min read
A Complete Guide to Social Engineering Attacks.

A Complete Guide to Social Engineering Attacks.

6
Comments
4 min read
Opening Pandora's Container - Gaining Host Access (Part 2)

Opening Pandora's Container - Gaining Host Access (Part 2)

Comments
8 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
HTTPS and SSLs: Why They Matter, How to Use Them

HTTPS and SSLs: Why They Matter, How to Use Them

Comments
5 min read
loading...