DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity: Trends for 2024

Cybersecurity: Trends for 2024

Comments
3 min read
5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

5 Most Common Security Misconfiguration Vulnerabilities and Their Mitigation

2
Comments
6 min read
Understanding the Twitter Hack of 2020: A Deep Dive

Understanding the Twitter Hack of 2020: A Deep Dive

5
Comments
2 min read
CYBER HYGIENE FOR YOUR IT INFRASTRUCTURE

CYBER HYGIENE FOR YOUR IT INFRASTRUCTURE

Comments
2 min read
Keep it cool and secure: do's and don'ts for managing Web App secrets

Keep it cool and secure: do's and don'ts for managing Web App secrets

1
Comments
7 min read
Meow | HackTheBox Write-up

Meow | HackTheBox Write-up

23
Comments
2 min read
HackTheBox - Writeup Sau [Retired]

HackTheBox - Writeup Sau [Retired]

Comments
7 min read
Introduction to SQL Injection Attacks

Introduction to SQL Injection Attacks

Comments
4 min read
Passkey Credential ID, User Name, User ID, User Handle

Passkey Credential ID, User Name, User ID, User Handle

8
Comments
2 min read
Crafting Malicious Pluggable Authentication Modules for Persistence, Privilege Escalation, and Lateral Movement

Crafting Malicious Pluggable Authentication Modules for Persistence, Privilege Escalation, and Lateral Movement

Comments
5 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
What is Infrastructure Security?

What is Infrastructure Security?

4
Comments 4
7 min read
How to install Kali Linux in 2024 also my thoughts on CyberSecurity, Penetration testing

How to install Kali Linux in 2024 also my thoughts on CyberSecurity, Penetration testing

Comments
1 min read
Protect your online Browsing or business with KASM. This video is for Educational purposes!

Protect your online Browsing or business with KASM. This video is for Educational purposes!

Comments
1 min read
Como proteger a sua aplicação web na AWS usando WAF (Web Application Firewall)

Como proteger a sua aplicação web na AWS usando WAF (Web Application Firewall)

Comments
1 min read
Text4Shell Decoded: Why This Vulnerability is a Cybersecurity Plot Twist

Text4Shell Decoded: Why This Vulnerability is a Cybersecurity Plot Twist

Comments
6 min read
Decoding Data Compliance: A Dive into the Data Act & Data Governance Act

Decoding Data Compliance: A Dive into the Data Act & Data Governance Act

Comments
7 min read
Unveiling the Power of Cybersecurity: Completing the Google Cybersecurity Professional Certificate

Unveiling the Power of Cybersecurity: Completing the Google Cybersecurity Professional Certificate

1
Comments
2 min read
Web App Warrior: Defense Strategies for Modern Threats

Web App Warrior: Defense Strategies for Modern Threats

Comments
10 min read
How to Get Free Cybersecurity Training?

How to Get Free Cybersecurity Training?

Comments 1
3 min read
Understanding SaaS vs Self-hosted: What are the Differences and Benefits of Each?

Understanding SaaS vs Self-hosted: What are the Differences and Benefits of Each?

2
Comments
7 min read
Linux Networking Commands />

Linux Networking Commands />

3
Comments 1
2 min read
Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

1
Comments
2 min read
Cyber resilience in applications on AWS-Using AWS Security Hub.

Cyber resilience in applications on AWS-Using AWS Security Hub.

2
Comments
4 min read
Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

28
Comments 3
9 min read
loading...