DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Cybersecurity Starts with the Network: Understanding the Basics

Cybersecurity Starts with the Network: Understanding the Basics

1
Comments 1
2 min read
Cloud Security: Protecting Your Data in the Digital Age

Cloud Security: Protecting Your Data in the Digital Age

Comments
1 min read
Installing Kali Linux: A Step-by-Step Guide (Without the Headaches)

Installing Kali Linux: A Step-by-Step Guide (Without the Headaches)

Comments
1 min read
Cybersecurity: The Importance of The Human Element

Cybersecurity: The Importance of The Human Element

Comments
12 min read
Unveiling the Hidden Risks: Exploring Flaws and Vulnerabilities in IoT

Unveiling the Hidden Risks: Exploring Flaws and Vulnerabilities in IoT

Comments
2 min read
Forward Proxy & Reverse Proxy. Que es?

Forward Proxy & Reverse Proxy. Que es?

6
Comments
3 min read
The Role of SCADA in Modern Industrial Control Systems

The Role of SCADA in Modern Industrial Control Systems

1
Comments
2 min read
How to Fortify and Safely Test Your Website Against Hackers

How to Fortify and Safely Test Your Website Against Hackers

3
Comments
2 min read
WebAuthn PRF Extension, Related Origins & Passkey Upgrades

WebAuthn PRF Extension, Related Origins & Passkey Upgrades

Comments
3 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
How to Enable Dynamic Protection in SafeLine WAF for Enhanced Security

How to Enable Dynamic Protection in SafeLine WAF for Enhanced Security

4
Comments
2 min read
3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

Comments
1 min read
Security+ Exam Requirements

Security+ Exam Requirements

Comments
3 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

5
Comments
5 min read
Understand the terminologies of in CS

Understand the terminologies of in CS

3
Comments
3 min read
Safeguard Your Website with SafeLine

Safeguard Your Website with SafeLine

7
Comments
4 min read
Multi-Factor Authentication(MFA)

Multi-Factor Authentication(MFA)

Comments
2 min read
Tech Spotlight: Daily Tech News 00:12

Tech Spotlight: Daily Tech News

12
Comments
1 min read
Simple and Easy-to-Use Web Security Gateway

Simple and Easy-to-Use Web Security Gateway

5
Comments
2 min read
Guardrails AI, AAAL Pt.5

Guardrails AI, AAAL Pt.5

5
Comments
2 min read
How Infrastructure Monitoring Can Prevent a Cyber Attack

How Infrastructure Monitoring Can Prevent a Cyber Attack

1
Comments
4 min read
Subnetting Basics Guide

Subnetting Basics Guide

6
Comments
3 min read
Is this thing on?

Is this thing on?

Comments
1 min read
Hack The Box Writeup: Heist

Hack The Box Writeup: Heist

Comments
13 min read
Sage Hosting vs On-Premises: A Data-Driven Analysis

Sage Hosting vs On-Premises: A Data-Driven Analysis

Comments
4 min read
Unlock the Ultimate Free WAF: Secure Your Site Like a Pro

Unlock the Ultimate Free WAF: Secure Your Site Like a Pro

1
Comments
4 min read
Strengthen Your Web Security with SafeLine WAF on CentOS7

Strengthen Your Web Security with SafeLine WAF on CentOS7

7
Comments
3 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Determine the type of attack

Determine the type of attack

1
Comments 1
2 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
Crypto Authentication with Passkeys (Smart Wallets)

Crypto Authentication with Passkeys (Smart Wallets)

2
Comments 2
3 min read
Using LLMs For Kubernetes: Enter k8sgpt

Using LLMs For Kubernetes: Enter k8sgpt

44
Comments
4 min read
Guarding Your APIs: Mastering WAF and API Gateway Integration

Guarding Your APIs: Mastering WAF and API Gateway Integration

16
Comments
3 min read
User Agent Reduction in Chrome, Safari & Firefox

User Agent Reduction in Chrome, Safari & Firefox

4
Comments 2
3 min read
Boost Kubernetes Security: Deploying SafeLine WAF with Ingress-nginx

Boost Kubernetes Security: Deploying SafeLine WAF with Ingress-nginx

16
Comments 1
3 min read
What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
Jr Penetration Tester- Content Discovery- robots.txt

Jr Penetration Tester- Content Discovery- robots.txt

Comments
1 min read
Exploits Ep - 1: From Prototype Pollution to a 100% Discount

Exploits Ep - 1: From Prototype Pollution to a 100% Discount

72
Comments 13
10 min read
Common Ports and Protocols

Common Ports and Protocols

41
Comments 2
3 min read
Why Python Is Good For Cybersecurity

Why Python Is Good For Cybersecurity

9
Comments 2
4 min read
I lost $93 while testing the newly released Open AI vision

I lost $93 while testing the newly released Open AI vision

Comments
3 min read
Comprehensive Guide to Vulnerability Assessment: Part 1

Comprehensive Guide to Vulnerability Assessment: Part 1

Comments
3 min read
Mastering Cybersecurity: Your Gateway to a Safer Digital World 🔒

Mastering Cybersecurity: Your Gateway to a Safer Digital World 🔒

Comments
4 min read
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Comments
2 min read
NPM packages leveraged for cryptocurrency theft

NPM packages leveraged for cryptocurrency theft

8
Comments
5 min read
Jr Penetration Testing - Walking An Application - Viewing The Page Source

Jr Penetration Testing - Walking An Application - Viewing The Page Source

1
Comments
3 min read
What You ACTUALLY Need To Know For A Cybersecurity Job

What You ACTUALLY Need To Know For A Cybersecurity Job

31
Comments 4
4 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
Mastering Cloud Security: My Journey Deploying OWASP Juice Shop on AWS ECS

Mastering Cloud Security: My Journey Deploying OWASP Juice Shop on AWS ECS

1
Comments 1
4 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!

Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!

14
Comments
2 min read
SSL Certificate Pinning in Flutter

SSL Certificate Pinning in Flutter

1
Comments
7 min read
From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

Comments
5 min read
🛡️ Key cybersecurity threats in 2024: What should businesses know?

🛡️ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
Deep Dive into Essential Directories

Deep Dive into Essential Directories

24
Comments 8
4 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
Cybersecurity in Web Development OR Secure Website Is Equally Important For You And User

Cybersecurity in Web Development OR Secure Website Is Equally Important For You And User

1
Comments
2 min read
Mastering Web Security: How to Set Up and Test SafeLine with APISIX

Mastering Web Security: How to Set Up and Test SafeLine with APISIX

12
Comments
4 min read
Top 5 Best CRISC Study Resources

Top 5 Best CRISC Study Resources

Comments
3 min read
loading...