DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
So you think your password is strong

So you think your password is strong

56
Comments 21
2 min read
Spring4Shell: Spring Remote Code Execution Vulnerability

Spring4Shell: Spring Remote Code Execution Vulnerability

2
Comments
4 min read
Symfony Station Communiqué - 22 April 2022. A look at Symfony, PHP, and Cybersecurity News!

Symfony Station Communiqué - 22 April 2022. A look at Symfony, PHP, and Cybersecurity News!

6
Comments
10 min read
TryHackMe(THM)-Mrrobot Writeup

TryHackMe(THM)-Mrrobot Writeup

8
Comments
4 min read
Under the Hood: How BCrypt Functions

Under the Hood: How BCrypt Functions

10
Comments 1
4 min read
TryHackMe(THM)-Source Writeup

TryHackMe(THM)-Source Writeup

12
Comments
2 min read
Securing Containers with Seccomp: Part 2

Securing Containers with Seccomp: Part 2

5
Comments
9 min read
Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

4
Comments
5 min read
Symfony Station Communiqué - 15 April 2022. A look at Symfony and PHP news!

Symfony Station Communiqué - 15 April 2022. A look at Symfony and PHP news!

4
Comments
10 min read
Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

4
Comments
4 min read
Making Your Private VPN🔐

Making Your Private VPN🔐

9
Comments
4 min read
How to fit DevSecOps into CI/CD Pipelines

How to fit DevSecOps into CI/CD Pipelines

9
Comments
5 min read
Those pesky Shadow APIs

Those pesky Shadow APIs

20
Comments 2
3 min read
How do you protect your customers' data on Amazon S3?

How do you protect your customers' data on Amazon S3?

8
Comments
4 min read
Cloud Compliance and Assurance Within Reach

Cloud Compliance and Assurance Within Reach

3
Comments
2 min read
What is Cybersecurity? Its types, advantages and importance.

What is Cybersecurity? Its types, advantages and importance.

8
Comments
7 min read
2FA Login Plugin Featuring TOTP

2FA Login Plugin Featuring TOTP

9
Comments
6 min read
Symfony Station Communiqué - 8 April 2022. A look at Symfony, PHP, and Cybersecurity news!

Symfony Station Communiqué - 8 April 2022. A look at Symfony, PHP, and Cybersecurity news!

3
Comments
15 min read
Why APIs have become a security nightmare for SMBs and enterprises

Why APIs have become a security nightmare for SMBs and enterprises

15
Comments
3 min read
Seven Things a Cyber-Security Enthusiast Should Know

Seven Things a Cyber-Security Enthusiast Should Know

12
Comments 1
4 min read
5 API testing tools

5 API testing tools

46
Comments
4 min read
How an overlook in development wreaked havoc on the internet - The Log4Shell Vulnerability

How an overlook in development wreaked havoc on the internet - The Log4Shell Vulnerability

23
Comments 6
5 min read
pync - Netcat for Python

pync - Netcat for Python

3
Comments
1 min read
OverlayFS Exploit CVE-2021-3493

OverlayFS Exploit CVE-2021-3493

3
Comments
1 min read
How Courier Became SOC 2 Type 2 Compliant

How Courier Became SOC 2 Type 2 Compliant

5
Comments
5 min read
How to spoof your MAC address on macOS

How to spoof your MAC address on macOS

6
Comments 1
1 min read
Symfony Station Communiqué - 1 April 2022. A look at Symfony, PHP, and Cybersecurity News!

Symfony Station Communiqué - 1 April 2022. A look at Symfony, PHP, and Cybersecurity News!

4
Comments
13 min read
The THREAT HUNTER of your Cloud - Amazon Detective

The THREAT HUNTER of your Cloud - Amazon Detective

8
Comments
2 min read
A rundown of the biggest cyber attacks & breaches in 2021 - and what lies ahead for us

A rundown of the biggest cyber attacks & breaches in 2021 - and what lies ahead for us

8
Comments
6 min read
Securing Containers with Seccomp: Part 1

Securing Containers with Seccomp: Part 1

6
Comments
7 min read
Vulnerability Management

Vulnerability Management

10
Comments
2 min read
The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

10
Comments 4
10 min read
Securing K8s cluster with Kubescape

Securing K8s cluster with Kubescape

19
Comments
4 min read
Open source API Security testing tools

Open source API Security testing tools

31
Comments 1
2 min read
STIX & TAXII - Complete Knowledge

STIX & TAXII - Complete Knowledge

4
Comments
4 min read
TryHackMe - Searchlight - IMINT (Writeup)

TryHackMe - Searchlight - IMINT (Writeup)

7
Comments
8 min read
Creating reverse shell binary

Creating reverse shell binary

5
Comments 1
2 min read
Symfony Station Communiqué — 25 March 2022. A look at Symfony, PHP, and Cybersecurity News!

Symfony Station Communiqué — 25 March 2022. A look at Symfony, PHP, and Cybersecurity News!

4
Comments
14 min read
Sniffing the Reverse Shell

Sniffing the Reverse Shell

5
Comments
2 min read
Glimpse of Reverse Shell

Glimpse of Reverse Shell

4
Comments
1 min read
How do you perform API testing?

How do you perform API testing?

26
Comments
2 min read
Examine the Reassuringly Robust Flexibility and Extensibility of Symfony Security

Examine the Reassuringly Robust Flexibility and Extensibility of Symfony Security

12
Comments 2
10 min read
My First Lines of Code for CherryBomb ZAP extension

My First Lines of Code for CherryBomb ZAP extension

9
Comments
4 min read
Incident Response on AWS

Incident Response on AWS

13
Comments
5 min read
A Step-by-step Guide to Preventing Tailgating Attacks

A Step-by-step Guide to Preventing Tailgating Attacks

5
Comments
6 min read
My jounrey into API Security

My jounrey into API Security

23
Comments
2 min read
Failling in Bugbounty's

Failling in Bugbounty's

2
Comments
2 min read
Multi-Tenant Security Model: How To Mitigate Risks

Multi-Tenant Security Model: How To Mitigate Risks

6
Comments
4 min read
How to Become a Cyber Security Engineer

How to Become a Cyber Security Engineer

4
Comments 1
6 min read
Kali Sweet theme

Kali Sweet theme

6
Comments
1 min read
AWS Security Hub-Visualize Security Hub Finding and other Security Data

AWS Security Hub-Visualize Security Hub Finding and other Security Data

5
Comments
3 min read
Rails App Security

Rails App Security

4
Comments
2 min read
How To Install Metasploit6 In Android With Out Root?

How To Install Metasploit6 In Android With Out Root?

6
Comments
2 min read
11 Security tips to protect your website

11 Security tips to protect your website

133
Comments 11
6 min read
The Essential PCI Compliance Checklist

The Essential PCI Compliance Checklist

3
Comments 1
7 min read
Top 15 Best GRC (Governance, Risk, and Compliance) Tools

Top 15 Best GRC (Governance, Risk, and Compliance) Tools

3
Comments
9 min read
Symfony Station Communiqué - 11 March 2022. A look at Symfony and PHP news!

Symfony Station Communiqué - 11 March 2022. A look at Symfony and PHP news!

5
Comments
12 min read
How to Setup an SSH Jump Server

How to Setup an SSH Jump Server

2
Comments
4 min read
🛡Vulnerabilidad en login con PHP💉Ataque SQL INJECTION

🛡Vulnerabilidad en login con PHP💉Ataque SQL INJECTION

5
Comments
2 min read
What is Vulnerability Assessment?

What is Vulnerability Assessment?

6
Comments 1
4 min read
loading...