DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Start With Hacking

Start With Hacking

Comments
2 min read
Credential Dumping: LSASS Memory Dump Detection

Credential Dumping: LSASS Memory Dump Detection

Comments
2 min read
Credential Dumping: NTDS.dit Dump Detection

Credential Dumping: NTDS.dit Dump Detection

Comments
1 min read
Honeypot in Cybersecurity: Creating a Fake Access Point Honeypot 🚨

Honeypot in Cybersecurity: Creating a Fake Access Point Honeypot 🚨

1
Comments
3 min read
Credential Dumping: NTLM Hash Dump

Credential Dumping: NTLM Hash Dump

Comments
2 min read
Mastering SQLMap Tamper Scripts: The Ultimate Guide to Evading WAFs Like a Pro [Must Read Article]

Mastering SQLMap Tamper Scripts: The Ultimate Guide to Evading WAFs Like a Pro [Must Read Article]

5
Comments
3 min read
TryHackMe API Wizard Breach Walkthrough

TryHackMe API Wizard Breach Walkthrough

Comments
4 min read
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

5
Comments
2 min read
The DevOps Guide to WAF API Gateways

The DevOps Guide to WAF API Gateways

Comments
8 min read
Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

1
Comments
3 min read
What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

5
Comments
3 min read
Understanding Zero-Trust Architecture (ZTA)

Understanding Zero-Trust Architecture (ZTA)

4
Comments
4 min read
Anti Bot Protection with SafeLine 7.0

Anti Bot Protection with SafeLine 7.0

6
Comments
3 min read
𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Comments
2 min read
Here's How Generative AI Can Be Used In Cybersecurity 00:25

Here's How Generative AI Can Be Used In Cybersecurity

7
Comments
1 min read
Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Comments 1
5 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

10
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

11
Comments
5 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

10
Comments
4 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

10
Comments
4 min read
QPS for Beginners

QPS for Beginners

10
Comments
3 min read
End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

12
Comments
1 min read
loading...