DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

20
Comments
7 min read
Authentication vs. Authorization

Authentication vs. Authorization

161
Comments 4
2 min read
Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

Google XSS challenge: Level 6 aka Follow the 🐇 (detailed walkthrough)

4
Comments 1
4 min read
Hack The Box: Invite Challenge

Hack The Box: Invite Challenge

8
Comments
3 min read
Need Contributors!!!

Need Contributors!!!

3
Comments 1
1 min read
Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

Google XSS challenge: Level 2 aka Persistence is key (detailed walkthrough)

9
Comments 2
4 min read
Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

Google XSS challenge: Level 1 aka Hello world of XSS (detailed walkthrough)

9
Comments 5
3 min read
Top 10 Extensions You Must Use For Your Privacy

Top 10 Extensions You Must Use For Your Privacy

9
Comments
6 min read
Understanding Permissions On Linux

Understanding Permissions On Linux

7
Comments 2
3 min read
This is not called Hacking ?

This is not called Hacking ?

6
Comments
3 min read
Bypassing Google XSS challenge

Bypassing Google XSS challenge

5
Comments 1
4 min read
TryHackMe - ToolsRUs WriteUp

TryHackMe - ToolsRUs WriteUp

9
Comments
6 min read
Pwnable.kr - Bof: Write-Up (with rizin and pwntools)

Pwnable.kr - Bof: Write-Up (with rizin and pwntools)

5
Comments
3 min read
Administrative Access Commands On Linux

Administrative Access Commands On Linux

8
Comments 1
2 min read
Protegendo seu servidor contra acessos indevidos

Protegendo seu servidor contra acessos indevidos

8
Comments
2 min read
ARM shellcode

ARM shellcode

3
Comments
2 min read
CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

CVE-2021-3156: Heap-Based Buffer Overflow in Sudo

14
Comments
3 min read
Common Cyber Attacks

Common Cyber Attacks

7
Comments 1
8 min read
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

632
Comments 16
7 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

43
Comments 3
8 min read
Wreaking Havoc via an API (with Python code)

Wreaking Havoc via an API (with Python code)

6
Comments
5 min read
Serverless Security Part 1: Dependencies

Serverless Security Part 1: Dependencies

3
Comments
5 min read
Parler wasn’t hacked: It just lacked the most basic security & privacy measures

Parler wasn’t hacked: It just lacked the most basic security & privacy measures

17
Comments
3 min read
How I Documented, Encrypted, and Tested My First REST API

How I Documented, Encrypted, and Tested My First REST API

5
Comments
4 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

14
Comments 12
3 min read
loading...