DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Azure Key Vault

Azure Key Vault

1
Comments
4 min read
Microsoft Entra (Azure AD) Passkeys: Elevating Employee Authentication

Microsoft Entra (Azure AD) Passkeys: Elevating Employee Authentication

2
Comments
3 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

12
Comments 6
5 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

40
Comments 4
6 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

3
Comments
8 min read
Man In The Middle Attack (MITM) Part 1 — ARP Spoofing

Man In The Middle Attack (MITM) Part 1 — ARP Spoofing

Comments
15 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
How Passkeys Enable Invisible MFA

How Passkeys Enable Invisible MFA

5
Comments
2 min read
Unleashing Shodany: Elevating Ruby Development with Seamless Shodan Integration

Unleashing Shodany: Elevating Ruby Development with Seamless Shodan Integration

1
Comments
2 min read
Common ports

Common ports

Comments
1 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
How to Find & Secure Exposed Microsoft Azure Buckets in 2024

How to Find & Secure Exposed Microsoft Azure Buckets in 2024

Comments
5 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

8
Comments
3 min read
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability

Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability

3
Comments
39 min read
Threat Detection and Response (TDR): What is it and Do You Need it?

Threat Detection and Response (TDR): What is it and Do You Need it?

Comments
5 min read
Children’s Introduction Guide to Zero Trust

Children’s Introduction Guide to Zero Trust

2
Comments
6 min read
ChiBrrCon IV: Understanding risks and the role of the CISO

ChiBrrCon IV: Understanding risks and the role of the CISO

1
Comments
7 min read
HackTheBox - Writeup Drive [Retired]

HackTheBox - Writeup Drive [Retired]

Comments 1
15 min read
Technology Trends in Focus: Examining the Forces Driving Innovation

Technology Trends in Focus: Examining the Forces Driving Innovation

1
Comments 1
3 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

Comments
11 min read
Designing Security Workflows using Gitlab CI Templates

Designing Security Workflows using Gitlab CI Templates

3
Comments
5 min read
What is Website Defacement Attack?

What is Website Defacement Attack?

Comments
2 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Next-Level Methods for Managing Networks Efficiently in 2024

Next-Level Methods for Managing Networks Efficiently in 2024

2
Comments 1
2 min read
Threat Detection and Response (TDR): What is it and Do You Need it?

Threat Detection and Response (TDR): What is it and Do You Need it?

Comments
5 min read
Cloud cyber attacks

Cloud cyber attacks

Comments
2 min read
Wi-Fi Deauthentication attack

Wi-Fi Deauthentication attack

Comments
3 min read
MITM attack

MITM attack

Comments
3 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Cybersecurity in the IoT Era: Protecting Your Digital Footprint

Cybersecurity in the IoT Era: Protecting Your Digital Footprint

Comments
8 min read
Dynamic Talks | OWASP API SECURITY TOP 10 - 2023

Dynamic Talks | OWASP API SECURITY TOP 10 - 2023

Comments
1 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
Understanding WEP and WPA-PSK in Wireless Router Security

Understanding WEP and WPA-PSK in Wireless Router Security

Comments
3 min read
Passwordless Authentication is the future !?

Passwordless Authentication is the future !?

Comments
3 min read
Beyond Rubrik: An In-Depth Analysis of Competing Backup and Recovery Programs

Beyond Rubrik: An In-Depth Analysis of Competing Backup and Recovery Programs

Comments
3 min read
Why File Backup is Your Best Defense Against Data Loss

Why File Backup is Your Best Defense Against Data Loss

Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

3
Comments
3 min read
Feels like I am starting from scratch after a computer science degree.....

Feels like I am starting from scratch after a computer science degree.....

Comments
1 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

7
Comments
4 min read
INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
The Future of Cyber Security: Trends to Watch in 2024

The Future of Cyber Security: Trends to Watch in 2024

Comments
3 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

7
Comments 4
1 min read
Picked The Red Pill

Picked The Red Pill

Comments
5 min read
Quit Smoking, Start H@ckN!

Quit Smoking, Start H@ckN!

Comments
3 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

5
Comments
5 min read
GUI vs CLI

GUI vs CLI

3
Comments
2 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

7
Comments 3
4 min read
5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

Comments
3 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
What is a Rootkit?

What is a Rootkit?

Comments
2 min read
Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

Introduction to QuantCrypt: A Python Library for Quantum-Resistant Cryptography

1
Comments
4 min read
loading...