DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Explained: Gesturejacking and Clickjacking

Explained: Gesturejacking and Clickjacking

2
Comments
3 min read
🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

6
Comments
2 min read
Embarking on a YouTube Challenge: Python, Django, Cyber Security

Embarking on a YouTube Challenge: Python, Django, Cyber Security

2
Comments 3
1 min read
Navigating the Evolution of AI in Cybersecurity: Insights from Mastercard at #RiskX 2023

Navigating the Evolution of AI in Cybersecurity: Insights from Mastercard at #RiskX 2023

Comments
3 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
Routing in Computer Networking

Routing in Computer Networking

1
Comments
8 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

5
Comments
5 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

5
Comments
5 min read
Beyond Read and Write: Executing Files with chmod

Beyond Read and Write: Executing Files with chmod

3
Comments
5 min read
[Hack] picoCTF - Mod 26

[Hack] picoCTF - Mod 26

2
Comments 2
1 min read
How my open source tool got 100 stars in 4 days!

How my open source tool got 100 stars in 4 days!

42
Comments 4
3 min read
How I transformed my career from software engineer to a penetration tester?

How I transformed my career from software engineer to a penetration tester?

Comments
2 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
Understanding HTTP and HTTPS: How They Work and Secure Data Transmission

Understanding HTTP and HTTPS: How They Work and Secure Data Transmission

1
Comments 1
5 min read
Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

6
Comments
5 min read
Delay-Based Attack Payload

Delay-Based Attack Payload

1
Comments
2 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
What are Synced Passkeys?

What are Synced Passkeys?

2
Comments
2 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
Command Injection (Course Content)

Command Injection (Course Content)

5
Comments
3 min read
Loop DOS? Letś Discuss.

Loop DOS? Letś Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Protection from Cybersecurity: Importance of SSL

Protection from Cybersecurity: Importance of SSL

Comments
3 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
Deciphering the Digital Fortress: Next-Gen Data Security in 2024

Deciphering the Digital Fortress: Next-Gen Data Security in 2024

5
Comments
3 min read
TeamPass a Self-hosted Password manager to increase organization’s CyberSecurity

TeamPass a Self-hosted Password manager to increase organization’s CyberSecurity

Comments
2 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

15
Comments
1 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
Wazuh-Audit Kubernetes Cluster [RKE2]

Wazuh-Audit Kubernetes Cluster [RKE2]

1
Comments
5 min read
Create a customized identity verification pipeline

Create a customized identity verification pipeline

26
Comments
1 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
Top 10 Cybersecurity Technologies

Top 10 Cybersecurity Technologies

Comments
3 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
Learn WebSec with Sain: Introduction

Learn WebSec with Sain: Introduction

Comments
3 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

2
Comments
3 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
Network Performance

Network Performance

1
Comments
3 min read
Exploring the World of SAST and DAST with a DevSecOps Twist

Exploring the World of SAST and DAST with a DevSecOps Twist

3
Comments
4 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

2
Comments
5 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
PicoCTF 2024: packer

PicoCTF 2024: packer

3
Comments 2
2 min read
[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

2
Comments 2
4 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

3
Comments
2 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

2
Comments
6 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 2
6 min read
Unbreakable 2024: secrets-of-winter

Unbreakable 2024: secrets-of-winter

Comments
2 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments 1
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
SQL Injection - Course Content

SQL Injection - Course Content

1
Comments
4 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

22
Comments
6 min read
loading...