DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Crack the Code Like Caesar: Build Your Own Secret Message Encrypter! [Python code included]

Crack the Code Like Caesar: Build Your Own Secret Message Encrypter! [Python code included]

1
Comments 1
3 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Comments
4 min read
Learning Cyber Security Day 4 - Integrating Encryption in Your Code🔐

Learning Cyber Security Day 4 - Integrating Encryption in Your Code🔐

Comments
3 min read
Beware: Your Browser Might Be Watching You

Beware: Your Browser Might Be Watching You

Comments
2 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

1
Comments
11 min read
HackTheBox - Writeup Devvortex [Retired]

HackTheBox - Writeup Devvortex [Retired]

Comments
12 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
How Do Free Apps Make Money?

How Do Free Apps Make Money?

5
Comments
5 min read
Level Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We Face

Level Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We Face

Comments
2 min read
Penetration Testion, A Guide.

Penetration Testion, A Guide.

Comments
2 min read
Customer Onboarding and Identity Verification APIs

Customer Onboarding and Identity Verification APIs

Comments
2 min read
HOW TO CREATE A VIRTUAL MACHINE SCALE SET

HOW TO CREATE A VIRTUAL MACHINE SCALE SET

Comments
3 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

3
Comments
11 min read
Explained: Gesturejacking and Clickjacking

Explained: Gesturejacking and Clickjacking

2
Comments
3 min read
🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

6
Comments
2 min read
Embarking on a YouTube Challenge: Python, Django, Cyber Security

Embarking on a YouTube Challenge: Python, Django, Cyber Security

2
Comments 3
1 min read
Navigating the Evolution of AI in Cybersecurity: Insights from Mastercard at #RiskX 2023

Navigating the Evolution of AI in Cybersecurity: Insights from Mastercard at #RiskX 2023

Comments
3 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
Routing in Computer Networking

Routing in Computer Networking

1
Comments
8 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

5
Comments
5 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

5
Comments
5 min read
Beyond Read and Write: Executing Files with chmod

Beyond Read and Write: Executing Files with chmod

3
Comments
5 min read
[Hack] picoCTF - Mod 26

[Hack] picoCTF - Mod 26

2
Comments 2
1 min read
How my open source tool got 100 stars in 4 days!

How my open source tool got 100 stars in 4 days!

42
Comments 4
3 min read
How I transformed my career from software engineer to a penetration tester?

How I transformed my career from software engineer to a penetration tester?

Comments
2 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
Understanding HTTP and HTTPS: How They Work and Secure Data Transmission

Understanding HTTP and HTTPS: How They Work and Secure Data Transmission

1
Comments 1
5 min read
Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

6
Comments
5 min read
Delay-Based Attack Payload

Delay-Based Attack Payload

1
Comments
2 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

1
Comments
3 min read
What are Synced Passkeys?

What are Synced Passkeys?

2
Comments
2 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
Command Injection (Course Content)

Command Injection (Course Content)

5
Comments
3 min read
Loop DOS? Letś Discuss.

Loop DOS? Letś Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Protection from Cybersecurity: Importance of SSL

Protection from Cybersecurity: Importance of SSL

Comments
3 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
Deciphering the Digital Fortress: Next-Gen Data Security in 2024

Deciphering the Digital Fortress: Next-Gen Data Security in 2024

5
Comments
3 min read
TeamPass a Self-hosted Password manager to increase organization’s CyberSecurity

TeamPass a Self-hosted Password manager to increase organization’s CyberSecurity

Comments
2 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

15
Comments
1 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
Wazuh-Audit Kubernetes Cluster [RKE2]

Wazuh-Audit Kubernetes Cluster [RKE2]

1
Comments
5 min read
Create a customized identity verification pipeline

Create a customized identity verification pipeline

31
Comments
1 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
Top 10 Cybersecurity Technologies

Top 10 Cybersecurity Technologies

Comments
3 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
Learn WebSec with Sain: Introduction

Learn WebSec with Sain: Introduction

Comments
3 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

2
Comments
3 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
Network Performance

Network Performance

1
Comments
3 min read
Exploring the World of SAST and DAST with a DevSecOps Twist

Exploring the World of SAST and DAST with a DevSecOps Twist

3
Comments
4 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

3
Comments
5 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
PicoCTF 2024: packer

PicoCTF 2024: packer

3
Comments 2
2 min read
loading...