DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Passkeys Protect Against Phishing

How Passkeys Protect Against Phishing

2
Comments 1
2 min read
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

1
Comments 2
3 min read
Exposing the Deception: Discord Account Generator with Hidden Malware

Exposing the Deception: Discord Account Generator with Hidden Malware

12
Comments 2
5 min read
Mobile Security Tools part 2: Frida

Mobile Security Tools part 2: Frida

19
Comments
3 min read
Passkeys & Dynamic Linking

Passkeys & Dynamic Linking

Comments 1
2 min read
AI in IT: How Artificial Intelligence Will Transform the IT industry

AI in IT: How Artificial Intelligence Will Transform the IT industry

Comments
4 min read
Top 6 Ransomware Defense Tactics You Must Know

Top 6 Ransomware Defense Tactics You Must Know

1
Comments
2 min read
Understanding OTP SMS Bombing

Understanding OTP SMS Bombing

7
Comments
2 min read
SAST Scanning with SonarQube and Docker

SAST Scanning with SonarQube and Docker

11
Comments
10 min read
Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Exploring Supply Chain and Cybersecurity Innovations in Full Stack Coding: An Insider's Take

Exploring Supply Chain and Cybersecurity Innovations in Full Stack Coding: An Insider's Take

Comments
3 min read
PSD3 & PSR Implications for Passkey Authentication

PSD3 & PSR Implications for Passkey Authentication

Comments 1
3 min read
Social engineering

Social engineering

26
Comments
10 min read
How to Select the Right Data Discovery Tool for Your Requirements

How to Select the Right Data Discovery Tool for Your Requirements

Comments
8 min read
Are Passkeys SCA-Compliant?

Are Passkeys SCA-Compliant?

1
Comments 1
3 min read
Top 10 Methods for Securing Mobile Devices and Applications

Top 10 Methods for Securing Mobile Devices and Applications

Comments
3 min read
What are the PSD2 & SCA Requirements?

What are the PSD2 & SCA Requirements?

1
Comments 1
3 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

1
Comments
15 min read
HackTheBox - Writeup Monitored [Retired]

HackTheBox - Writeup Monitored [Retired]

1
Comments
21 min read
Deepfake Technologies Can Steal Your Identity Even if You Don’t Use Generative AI

Deepfake Technologies Can Steal Your Identity Even if You Don’t Use Generative AI

Comments
3 min read
Ransomware Defense: Comprehensive Guide to Data and System Safety

Ransomware Defense: Comprehensive Guide to Data and System Safety

2
Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

Comments
3 min read
Hacking a Server in Three Acts

Hacking a Server in Three Acts

Comments
4 min read
Bug Bounty Hunting 101: An Introduction for Beginners

Bug Bounty Hunting 101: An Introduction for Beginners

28
Comments 1
6 min read
loading...