DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to prevent XSS Attacks in ASP.NET Core Web API

How to prevent XSS Attacks in ASP.NET Core Web API

16
Comments 1
3 min read
SQL INJECTION AND ITS TYPES.

SQL INJECTION AND ITS TYPES.

4
Comments
3 min read
Unprotected Functionality

Unprotected Functionality

Comments
1 min read
Top 10 Web Application Security Threats

Top 10 Web Application Security Threats

10
Comments
6 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

10
Comments
5 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

10
Comments
6 min read
Five Free Security Tools That Will Surprise You

Five Free Security Tools That Will Surprise You

1
Comments
3 min read
Recent 0day Threat Intelligence Alert from Darknet

Recent 0day Threat Intelligence Alert from Darknet

10
Comments
2 min read
Hotel Booking Data Breach of Taiwan Tourists

Hotel Booking Data Breach of Taiwan Tourists

10
Comments
3 min read
POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

14
Comments
3 min read
OWASP Juice Shop DOM XSS Walkthrough <OWASP-JS Pt.2>

OWASP Juice Shop DOM XSS Walkthrough <OWASP-JS Pt.2>

4
Comments
3 min read
Getting Started with Ansible: Automation Meets Cybersecurity

Getting Started with Ansible: Automation Meets Cybersecurity

1
Comments
4 min read
Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!

Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!

Comments
3 min read
Turn Your VPS into an Impenetrable Fortress: How to Make Your Public Server Private Using Tailscale and UFW!

Turn Your VPS into an Impenetrable Fortress: How to Make Your Public Server Private Using Tailscale and UFW!

2
Comments
4 min read
From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Applications to Find My Calling

From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Applications to Find My Calling

Comments
6 min read
Finding Private Information Through Resumes on Google Search

Finding Private Information Through Resumes on Google Search

Comments
3 min read
Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Comments
2 min read
The Book Nook: A Website Security Crisis

The Book Nook: A Website Security Crisis

12
Comments
3 min read
How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

2
Comments
5 min read
Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

5
Comments
2 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments 1
3 min read
Implementing Network Security: A Guide to Modern Methodologies

Implementing Network Security: A Guide to Modern Methodologies

11
Comments 1
5 min read
Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

1
Comments
3 min read
Automated Security Operations with Safeline WAF (Part 2)

Automated Security Operations with Safeline WAF (Part 2)

10
Comments
5 min read
loading...