DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Select the Right Data Discovery Tool for Your Requirements

How to Select the Right Data Discovery Tool for Your Requirements

Comments
8 min read
Are Passkeys SCA-Compliant?

Are Passkeys SCA-Compliant?

1
Comments 1
3 min read
Top 10 Methods for Securing Mobile Devices and Applications

Top 10 Methods for Securing Mobile Devices and Applications

Comments
3 min read
What are the PSD2 & SCA Requirements?

What are the PSD2 & SCA Requirements?

1
Comments 1
3 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

1
Comments
15 min read
HackTheBox - Writeup Monitored [Retired]

HackTheBox - Writeup Monitored [Retired]

1
Comments
21 min read
Ransomware Defense: Comprehensive Guide to Data and System Safety

Ransomware Defense: Comprehensive Guide to Data and System Safety

3
Comments
3 min read
Data Encryption

Data Encryption

1
Comments
2 min read
Penetration Testing Tools

Penetration Testing Tools

Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

Comments
3 min read
Hacking a Server in Three Acts

Hacking a Server in Three Acts

Comments
4 min read
Bug Bounty Hunting 101: An Introduction for Beginners

Bug Bounty Hunting 101: An Introduction for Beginners

23
Comments 1
6 min read
The Pyramid of Pain: A Threat Intelligence Concept

The Pyramid of Pain: A Threat Intelligence Concept

2
Comments
1 min read
Simple + Secure Password Generator with Python🔐

Simple + Secure Password Generator with Python🔐

1
Comments
1 min read
Behind the scenes with FTP

Behind the scenes with FTP

1
Comments
5 min read
[HTB] Machine - Lame

[HTB] Machine - Lame

2
Comments
2 min read
[HTB] Sherlock - Brutus

[HTB] Sherlock - Brutus

2
Comments
3 min read
What is Rainbow Table Attack?

What is Rainbow Table Attack?

Comments
2 min read
Cyber-safe Digital Space

Cyber-safe Digital Space

1
Comments
2 min read
Password Managers - The Future of Logins.

Password Managers - The Future of Logins.

19
Comments 3
2 min read
Integrate DEV.to blogs to WordPress site

Integrate DEV.to blogs to WordPress site

Comments
2 min read
IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

1
Comments
6 min read
Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

1
Comments
13 min read
The White House's Directive on Cybersecurity

The White House's Directive on Cybersecurity

2
Comments
5 min read
Why you should deprecate the Resource Owner Password Credentials (ROPC) grant type

Why you should deprecate the Resource Owner Password Credentials (ROPC) grant type

10
Comments
5 min read
Serverless Security Best Practices

Serverless Security Best Practices

1
Comments
9 min read
Online Safety: A Guide to Protecting Yourself

Online Safety: A Guide to Protecting Yourself

Comments
7 min read
Gaps in SOC Operator and Analyst Skillsets

Gaps in SOC Operator and Analyst Skillsets

Comments
3 min read
Integrating Faceio using HTMX

Integrating Faceio using HTMX

Comments
3 min read
Security Best Practices in Solidity

Security Best Practices in Solidity

Comments
4 min read
How SSH Works - Under The Hood

How SSH Works - Under The Hood

2
Comments
4 min read
Understanding Spillage in Cyber Awareness

Understanding Spillage in Cyber Awareness

Comments
5 min read
Leading Trends and Threats in Cybersecurity

Leading Trends and Threats in Cybersecurity

Comments
2 min read
TryHackMe IR Philosophy and Ethics Walkthrough

TryHackMe IR Philosophy and Ethics Walkthrough

2
Comments
3 min read
Adopt AI, But Responsibly!

Adopt AI, But Responsibly!

Comments
10 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
IoT Security Vulnerabilities in Operational Technology: Addressing the Risks

IoT Security Vulnerabilities in Operational Technology: Addressing the Risks

Comments
5 min read
How to Start From The Bottom

How to Start From The Bottom

Comments
2 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

35
Comments
2 min read
Mastering the AWS Security Specialty (SCS) Exam - A Quick Guide

Mastering the AWS Security Specialty (SCS) Exam - A Quick Guide

7
Comments 4
6 min read
Cloud Application Security – Top Threats and Best Practices

Cloud Application Security – Top Threats and Best Practices

Comments
7 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
First- & Third Passkey Provider Explained

First- & Third Passkey Provider Explained

Comments
2 min read
9 Tips to Correctly Understand and Configure IAM on GCP

9 Tips to Correctly Understand and Configure IAM on GCP

2
Comments
7 min read
8 Essential Components Every Dynamic Risk Assessment Must Have

8 Essential Components Every Dynamic Risk Assessment Must Have

Comments
7 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
Applying security principles to avoid getting pickpocketed

Applying security principles to avoid getting pickpocketed

Comments
4 min read
[Book Review] Linux Basics for Hackers by OccupyTheWeb

[Book Review] Linux Basics for Hackers by OccupyTheWeb

Comments
4 min read
Yet another reason why the xz backdoor is a sneaky b@$tard

Yet another reason why the xz backdoor is a sneaky b@$tard

1
Comments
5 min read
What is SQL Injection?

What is SQL Injection?

Comments
3 min read
No Code Cybersecurity Protection in 2024 🔐

No Code Cybersecurity Protection in 2024 🔐

1
Comments
3 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
[Adventure to Cybersecurity] Common DNS records

[Adventure to Cybersecurity] Common DNS records

Comments
2 min read
Brute Force Attacks and CAPTCHA

Brute Force Attacks and CAPTCHA

37
Comments 1
2 min read
9 Tips to Correctly Understand and Configure IAM on GCP

9 Tips to Correctly Understand and Configure IAM on GCP

Comments
7 min read
Scopes and Claims Explained

Scopes and Claims Explained

2
Comments
3 min read
Integridad y confidencialidad: Porque no entregar el hash de un número de tarjeta

Integridad y confidencialidad: Porque no entregar el hash de un número de tarjeta

1
Comments
7 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
Crypto Banking Trends: Factors Fueling the Sector in 2024

Crypto Banking Trends: Factors Fueling the Sector in 2024

Comments 1
1 min read
CISM vs CISSP: The Ultimate Comparison 2024 💡

CISM vs CISSP: The Ultimate Comparison 2024 💡

18
Comments
5 min read
loading...