DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Setup Semgrep Rules for Optimal SAST Scanning

How to Setup Semgrep Rules for Optimal SAST Scanning

3
Comments
7 min read
The Summary Of Spring Security Authorization Bypass on Java

The Summary Of Spring Security Authorization Bypass on Java

1
Comments
12 min read
Top OWASP Resources to Follow

Top OWASP Resources to Follow

Comments
2 min read
WebLogic Deserialization Vulnerability - CVE-2023-21839

WebLogic Deserialization Vulnerability - CVE-2023-21839

1
Comments
3 min read
Top Cybersecurity Tools

Top Cybersecurity Tools

1
Comments
2 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
What Does Identity Provider Actually Mean?

What Does Identity Provider Actually Mean?

3
Comments
2 min read
Top 5 Auth0 Alternatives for SSO

Top 5 Auth0 Alternatives for SSO

1
Comments
9 min read
Building a Budget Red Team Implant

Building a Budget Red Team Implant

1
Comments 1
6 min read
Bypass IP Restrictions with Burp Suite.

Bypass IP Restrictions with Burp Suite.

3
Comments
5 min read
Starting from nowhere

Starting from nowhere

3
Comments 3
1 min read
For better or worse: How APIs impact Cloud security

For better or worse: How APIs impact Cloud security

Comments
5 min read
How to write a GitLab backup script and why (not) to do it?

How to write a GitLab backup script and why (not) to do it?

Comments
6 min read
Secure Systems: A Quick Introduction to 4 Types of Cybersecurity

Secure Systems: A Quick Introduction to 4 Types of Cybersecurity

1
Comments 1
10 min read
Common Web Security Attacks and Top Tips to Protect Your Website

Common Web Security Attacks and Top Tips to Protect Your Website

9
Comments
2 min read
iptables rules that every Linux user should have - part one

iptables rules that every Linux user should have - part one

5
Comments
4 min read
What Does 2FA Actually Mean?

What Does 2FA Actually Mean?

3
Comments
3 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

12
Comments
4 min read
Managing network security aspects in the public cloud

Managing network security aspects in the public cloud

2
Comments
4 min read
Tutorial: DNS Enumeration using Python

Tutorial: DNS Enumeration using Python

11
Comments 3
3 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
A web security story from 2008: silently securing JSON.parse

A web security story from 2008: silently securing JSON.parse

7
Comments 1
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Understanding the nature of XSS

Understanding the nature of XSS

Comments
6 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
loading...