DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hello, world! about open-appsec beta program.

Hello, world! about open-appsec beta program.

10
Comments
2 min read
SIEM VS SOC & HOW SIEM WORKS!!

SIEM VS SOC & HOW SIEM WORKS!!

6
Comments
6 min read
Why front end should learn hacking

Why front end should learn hacking

2
Comments
2 min read
Top 5 Most Common API Vulnerabilities You Should Know About

Top 5 Most Common API Vulnerabilities You Should Know About

2
Comments
6 min read
SQL Injection Hacker Challenge

SQL Injection Hacker Challenge

2
Comments
3 min read
8 Data Security Best Practices for SaaS Applications

8 Data Security Best Practices for SaaS Applications

2
Comments
7 min read
Web Security: Introduction

Web Security: Introduction

12
Comments
3 min read
Make your first FaceAuth Webapp with FaceIO

Make your first FaceAuth Webapp with FaceIO

17
Comments
6 min read
Top 10 Software Deployment Tools for 2022

Top 10 Software Deployment Tools for 2022

8
Comments
11 min read
Forging GraphQL Bombs, the 2022 version of Zip Bombs

Forging GraphQL Bombs, the 2022 version of Zip Bombs

47
Comments 2
4 min read
Hackers, invasões e roubo de dados: perigo à espreita

Hackers, invasões e roubo de dados: perigo à espreita

7
Comments
4 min read
CTF - Advent of Cyber 2 [2020] Writeups (Day1 to Day9)

CTF - Advent of Cyber 2 [2020] Writeups (Day1 to Day9)

9
Comments
8 min read
How I Landed A Job In Cyber Security With No Professional Experience, Certifications, Nor A Degree

How I Landed A Job In Cyber Security With No Professional Experience, Certifications, Nor A Degree

8
Comments
14 min read
SQL Injections Explained

SQL Injections Explained

8
Comments 1
5 min read
Concepts for Network Security

Concepts for Network Security

9
Comments
3 min read
Cybersecurity Programming: SQL Injection Scanner with Python

Cybersecurity Programming: SQL Injection Scanner with Python

20
Comments
1 min read
ENV vars and security

ENV vars and security

29
Comments
4 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

4
Comments
4 min read
Project to fight DDoS with proof of work

Project to fight DDoS with proof of work

6
Comments
2 min read
How to make security policies a team effort

How to make security policies a team effort

7
Comments
5 min read
My Hacking Journey

My Hacking Journey

3
Comments 1
2 min read
Hazardous implementation of password reset

Hazardous implementation of password reset

13
Comments
3 min read
DevSecOps: A Complete Guide

DevSecOps: A Complete Guide

22
Comments
8 min read
What Exactly is Pretexting? What You Need to Know About the Cyber Security Technique

What Exactly is Pretexting? What You Need to Know About the Cyber Security Technique

4
Comments
3 min read
A deep-dive into browser fingerprinting and privacy

A deep-dive into browser fingerprinting and privacy

6
Comments
3 min read
loading...