DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Unbreakable 2024: Easy-hide

Unbreakable 2024: Easy-hide

Comments
1 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Trickster- PicoCTF 2024

Trickster- PicoCTF 2024

1
Comments
2 min read
Passkeys in web3: Passkeys @ Binance

Passkeys in web3: Passkeys @ Binance

1
Comments
2 min read
Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Comments
2 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
PySniffer: A Wireless Network Tool

PySniffer: A Wireless Network Tool

1
Comments
4 min read
14 Cybersecurity Awareness Topics You Need to Cover

14 Cybersecurity Awareness Topics You Need to Cover

Comments
7 min read
Is 2-Step-Verification (2SV) or 2-Factor-Authentication (2FA) Better?

Is 2-Step-Verification (2SV) or 2-Factor-Authentication (2FA) Better?

1
Comments
2 min read
Comprehensive Cybersecurity Bootcamp: Securing the Digital World

Comprehensive Cybersecurity Bootcamp: Securing the Digital World

1
Comments
2 min read
7 Essential SaaS Security Best Practices

7 Essential SaaS Security Best Practices

1
Comments
7 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
What is Identity Governance: 5 Steps to Build Your Framework

What is Identity Governance: 5 Steps to Build Your Framework

Comments
6 min read
What is Network Scanning

What is Network Scanning

Comments
4 min read
Exploring JavaScript Obfuscation in Web Development and Cybersecurity

Exploring JavaScript Obfuscation in Web Development and Cybersecurity

Comments
3 min read
Automate identification of uncommon DNS requests with Cisco Umbrella API

Automate identification of uncommon DNS requests with Cisco Umbrella API

1
Comments 2
9 min read
AWS GuardDuty for ATP (Advanced Threat Detection)

AWS GuardDuty for ATP (Advanced Threat Detection)

3
Comments
2 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
The Role of Emotional Intelligence in Leadership

The Role of Emotional Intelligence in Leadership

3
Comments
5 min read
Mastering Cybersecurity: Moving Beyond Common Mistakes

Mastering Cybersecurity: Moving Beyond Common Mistakes

Comments
2 min read
SQL Injection attack

SQL Injection attack

Comments
2 min read
Host your own CTF for free đź’¸ (CTFd Setup Guide)

Host your own CTF for free đź’¸ (CTFd Setup Guide)

46
Comments
3 min read
how to learn hacking

how to learn hacking

Comments
1 min read
Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!

Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!

Comments
2 min read
Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Comments
6 min read
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Comments
6 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Comments
2 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

1
Comments
6 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Comments
2 min read
[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

6
Comments
3 min read
Dark Web and Its Impact on Data Privacy

Dark Web and Its Impact on Data Privacy

Comments
3 min read
Security Centralization for AWS Multi-account using Native Services

Security Centralization for AWS Multi-account using Native Services

Comments
14 min read
Desmontagem e o IDA Pro na Análise de Programas

Desmontagem e o IDA Pro na Análise de Programas

10
Comments
8 min read
Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
Implementing SSL VPN Using FortiGate in AWS Cloud

Implementing SSL VPN Using FortiGate in AWS Cloud

Comments
5 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

26
Comments 8
2 min read
Development of smart contracts on Foundry:

Development of smart contracts on Foundry:

Comments
1 min read
Securing Fedora Linux with SELinux: A Comprehensive Guide

Securing Fedora Linux with SELinux: A Comprehensive Guide

4
Comments
3 min read
Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Comments
2 min read
Goal-Based Penetration Testing

Goal-Based Penetration Testing

Comments
1 min read
Are FIDO Passkeys SCA and PSD2 Compliant?

Are FIDO Passkeys SCA and PSD2 Compliant?

2
Comments
3 min read
What is DSPM? Data Security Posture Management Explained

What is DSPM? Data Security Posture Management Explained

Comments
2 min read
Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Comments
3 min read
Top 11 Website Security Software Solutions for 2024

Top 11 Website Security Software Solutions for 2024

Comments
10 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Banking Passkeys: How Revolut Implemented Passkeys

Banking Passkeys: How Revolut Implemented Passkeys

2
Comments 1
3 min read
IAM Vs PAM: What Is The Difference?

IAM Vs PAM: What Is The Difference?

Comments
7 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Cybersecurity in Tech Era

Cybersecurity in Tech Era

Comments 2
3 min read
What is the DevSecOps Maturity Model (DSOMM)?

What is the DevSecOps Maturity Model (DSOMM)?

Comments
7 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

44
Comments 3
12 min read
Top 7 Web Application Security Tools

Top 7 Web Application Security Tools

1
Comments
8 min read
loading...