DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Nuvem Pública, Privada e Híbrida: O que é cada uma?

Nuvem Pública, Privada e Híbrida: O que é cada uma?

3
Comments
3 min read
SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Security Meetup

Security Meetup

Comments
1 min read
Integration of Artificial Intelligence and Machine Learning in Cloud Security

Integration of Artificial Intelligence and Machine Learning in Cloud Security

1
Comments
5 min read
Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

4
Comments
8 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

7
Comments
2 min read
SafeLine: An open-source web application firewall that provides security at no cost.

SafeLine: An open-source web application firewall that provides security at no cost.

15
Comments
4 min read
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
Top 10 Application Security Vulnerabilities in 2024

Top 10 Application Security Vulnerabilities in 2024

21
Comments
6 min read
The State of Cybersecurity in Web Development: What You Need to Know in 2024

The State of Cybersecurity in Web Development: What You Need to Know in 2024

1
Comments
3 min read
WordPress Username Enumeration Attacks: Understanding and Prevention

WordPress Username Enumeration Attacks: Understanding and Prevention

1
Comments
11 min read
Como um Malware opera, quais são os seus tipos e como se proteger.

Como um Malware opera, quais são os seus tipos e como se proteger.

3
Comments
5 min read
Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Comments
5 min read
Stop Phishing by Analyzing the Bait

Stop Phishing by Analyzing the Bait

1
Comments
6 min read
Salting & Hashing🍳

Salting & Hashing🍳

Comments
1 min read
Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

1
Comments 1
7 min read
Securing Your Website: A Comprehensive Guide for Developers and Clients

Securing Your Website: A Comprehensive Guide for Developers and Clients

1
Comments
3 min read
Understanding Advanced Persistent Threats (APTs)

Understanding Advanced Persistent Threats (APTs)

2
Comments
3 min read
Essential Frameworks, Standards, and Programs for Building a Robust Information Security Plan

Essential Frameworks, Standards, and Programs for Building a Robust Information Security Plan

1
Comments
3 min read
What Every Cyber Specialist Needs to Know About Computer Structure

What Every Cyber Specialist Needs to Know About Computer Structure

1
Comments
2 min read
Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity

Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity

1
Comments
2 min read
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Comments
2 min read
My AiOPS Journey

My AiOPS Journey

4
Comments
3 min read
Understanding the Distinction Between Information Security and Cybersecurity

Understanding the Distinction Between Information Security and Cybersecurity

Comments
2 min read
Hack The Box  -  Archetype Walkthrough

Hack The Box  -  Archetype Walkthrough

2
Comments
9 min read
7 Ways to Improve Asset Visibility

7 Ways to Improve Asset Visibility

Comments
7 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Upstream preview: Welcome to Upstream 2024

Upstream preview: Welcome to Upstream 2024

Comments
3 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
🖋️ Pen Testing SQL Injections

🖋️ Pen Testing SQL Injections

4
Comments
2 min read
Starting Your Cloud Security Journey in AWS: A Comprehensive Guide

Starting Your Cloud Security Journey in AWS: A Comprehensive Guide

Comments
5 min read
Stronger AI, Weaker Security? The Quantum Computing Conundrum

Stronger AI, Weaker Security? The Quantum Computing Conundrum

1
Comments
5 min read
Secure Access to Connected Devices

Secure Access to Connected Devices

Comments
2 min read
Deepfake Technologies Can Steal Your Identity Even if You Don’t Use Generative AI

Deepfake Technologies Can Steal Your Identity Even if You Don’t Use Generative AI

Comments
3 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

3
Comments
2 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
What Technologies Help Prevent Cyber Attacks? 🛡️💻

What Technologies Help Prevent Cyber Attacks? 🛡️💻

2
Comments
1 min read
𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

1
Comments
1 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Purple Team Assessment

Purple Team Assessment

1
Comments
1 min read
What is Privileged Access Management (PAM)?

What is Privileged Access Management (PAM)?

Comments
2 min read
Gone in 120 seconds

Gone in 120 seconds

1
Comments
5 min read
Hacking Alibaba Cloud's Kubernetes Cluster

Hacking Alibaba Cloud's Kubernetes Cluster

6
Comments 1
14 min read
Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
Intro to Application Security

Intro to Application Security

23
Comments 6
3 min read
Cybersecurity 101 for Developers: From Zero to Hero

Cybersecurity 101 for Developers: From Zero to Hero

4
Comments
4 min read
Security in Requirements phase

Security in Requirements phase

5
Comments 2
8 min read
How to Study Cloud Cyber Security and Get an Entry-Level Job: A Detailed Guide

How to Study Cloud Cyber Security and Get an Entry-Level Job: A Detailed Guide

4
Comments
3 min read
CVE-2024-27867- Eavesdropping vulnerability AirPods

CVE-2024-27867- Eavesdropping vulnerability AirPods

1
Comments
1 min read
Try Hack Me: Linux PrivEsc Complete Steps

Try Hack Me: Linux PrivEsc Complete Steps

Comments
3 min read
Confusion vs Diffusion in cryptography

Confusion vs Diffusion in cryptography

Comments
1 min read
Secure Application Software Development

Secure Application Software Development

Comments
3 min read
How a “Skeleton Key” Could Crack Open Your AI’s Secrets

How a “Skeleton Key” Could Crack Open Your AI’s Secrets

Comments
2 min read
How to use SRI (Subresource integrtiy) attribute in script tag to prevent modification of static resources ?

How to use SRI (Subresource integrtiy) attribute in script tag to prevent modification of static resources ?

Comments
1 min read
Explorando abordagens de análise na Engenharia reversa:

Explorando abordagens de análise na Engenharia reversa:

41
Comments 2
4 min read
5 Types of Clone Phishing Attacks and Best Protection Strategies

5 Types of Clone Phishing Attacks and Best Protection Strategies

Comments
13 min read
Understanding Cybersecurity: A Beginner’s Guide

Understanding Cybersecurity: A Beginner’s Guide

3
Comments 1
3 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure

The Ultimate Guide to Building a Secure Cloud Infrastructure

1
Comments
3 min read
Worldwide Cybersecurity market summary Q1 2024

Worldwide Cybersecurity market summary Q1 2024

4
Comments 1
2 min read
loading...