DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Pen Testing Your Mobile Application (and Its API)

Pen Testing Your Mobile Application (and Its API)

1
Comments
4 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

21
Comments 12
4 min read
How to Set Up TLS on Cloudflare: A Step-by-Step Guide

How to Set Up TLS on Cloudflare: A Step-by-Step Guide

2
Comments
3 min read
🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

🕵️‍♂️ IoT Nightmare – How Smart Devices Spy on You

1
Comments
3 min read
The Importance of an AI Strategy

The Importance of an AI Strategy

16
Comments
12 min read
Protecting Against Open Source Malicious Packages: What Does (Not) Work

Protecting Against Open Source Malicious Packages: What Does (Not) Work

2
Comments
14 min read
Hack the box - Dancing (SMB)

Hack the box - Dancing (SMB)

Comments
2 min read
15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

Comments
34 min read
Zero Trust Security: Why It’s No Longer Optional

Zero Trust Security: Why It’s No Longer Optional

Comments
1 min read
AWS IAM Tutorial for Beginners: Easy Steps to Manage Access

AWS IAM Tutorial for Beginners: Easy Steps to Manage Access

2
Comments 2
5 min read
I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship

I’m glad to share that I have successfully completed the main technical track of the Cybersecurity Academy scholarship

1
Comments
1 min read
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About

🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About

Comments
2 min read
SafeLine vs Reblaze: Smarter WAF for Modern Web Protection?

SafeLine vs Reblaze: Smarter WAF for Modern Web Protection?

10
Comments
2 min read
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

6
Comments
2 min read
Understanding Microsoft SharePoint Zero-Day Vulnerabilities — What Developers Should Know

Understanding Microsoft SharePoint Zero-Day Vulnerabilities — What Developers Should Know

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.