DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Cross-Device Passkey Sync Between Web, iOS, Android App

Cross-Device Passkey Sync Between Web, iOS, Android App

4
Comments
2 min read
11 tips to spot Phishing Attack

11 tips to spot Phishing Attack

Comments
5 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Phishing Attack

Phishing Attack

1
Comments
2 min read
Why developers should learn hacking (and vice versa)

Why developers should learn hacking (and vice versa)

Comments
2 min read
How to Improve Your Website Security in 2024

How to Improve Your Website Security in 2024

2
Comments
5 min read
Why is Web App and API Security Testing So Critical?

Why is Web App and API Security Testing So Critical?

Comments
4 min read
What is Spyware?

What is Spyware?

1
Comments
2 min read
What is Adware?

What is Adware?

Comments
2 min read
The Essential Guide to SaaS Compliance

The Essential Guide to SaaS Compliance

Comments
6 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Embracing the Code: A Journey from Curious Kid to Microsoft Project Manager

Embracing the Code: A Journey from Curious Kid to Microsoft Project Manager

Comments
3 min read
🌟 Mastering the Art of Consistency in Tech: My Journey and Strategies 🌟

🌟 Mastering the Art of Consistency in Tech: My Journey and Strategies 🌟

3
Comments
3 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Mapping A Network (NMap)

Mapping A Network (NMap)

Comments
3 min read
Secure Development Practices to Safeguard Your Software

Secure Development Practices to Safeguard Your Software

Comments
3 min read
Software Supply Chain Awareness at Scale

Software Supply Chain Awareness at Scale

Comments
3 min read
Pi Minimal Workstation

Pi Minimal Workstation

Comments
4 min read
Entering Tux & CyberSec

Entering Tux & CyberSec

Comments
3 min read
Navigating the Risks of Third-Party Libraries in Web

Navigating the Risks of Third-Party Libraries in Web

Comments
4 min read
My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

2
Comments
3 min read
DevSecOps 101: What is DevSecOps?

DevSecOps 101: What is DevSecOps?

Comments
5 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments
2 min read
How Zero-Trust Architecture Design Enables Global Business Processes

How Zero-Trust Architecture Design Enables Global Business Processes

5
Comments
11 min read
Empowering Cybersecurity: A Guide to Enhancing Awareness and Resilience

Empowering Cybersecurity: A Guide to Enhancing Awareness and Resilience

Comments
2 min read
Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA

Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA

Comments
4 min read
What is a Supply Chain Attack?

What is a Supply Chain Attack?

Comments
3 min read
Redeemer | HackTheBox Write-up

Redeemer | HackTheBox Write-up

5
Comments
3 min read
21 Ecommerce Fraud Protection Policies to Implement Now

21 Ecommerce Fraud Protection Policies to Implement Now

Comments
6 min read
What is DDoS attack?

What is DDoS attack?

1
Comments
3 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
Join the XposedOrNot Hackathon 2024: Innovate for Internet Safety!

Join the XposedOrNot Hackathon 2024: Innovate for Internet Safety!

2
Comments
2 min read
Backend Security Risks and Tips on How to Prevent Them

Backend Security Risks and Tips on How to Prevent Them

Comments
4 min read
Developer Education - GitGuardian Supports Your Learning Style

Developer Education - GitGuardian Supports Your Learning Style

1
Comments
9 min read
Front-End Security: Popular Types of Attacks

Front-End Security: Popular Types of Attacks

6
Comments 1
5 min read
Dealing With GitHub Password Authentication Deprecation

Dealing With GitHub Password Authentication Deprecation

1
Comments
4 min read
How to Implement Basic Access Authentication in Spring Boot

How to Implement Basic Access Authentication in Spring Boot

Comments
6 min read
How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin

How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin

3
Comments
5 min read
Why should you care about the “security.txt” file on your website?

Why should you care about the “security.txt” file on your website?

1
Comments
3 min read
Top 10 CIAM Software Solutions

Top 10 CIAM Software Solutions

1
Comments
10 min read
Linux On The Go (Termux)

Linux On The Go (Termux)

5
Comments 1
2 min read
**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

3
Comments 4
2 min read
WebSecurity e a sua importância

WebSecurity e a sua importância

13
Comments 1
5 min read
The Role of OpenAPI in Modern API Security

The Role of OpenAPI in Modern API Security

1
Comments
4 min read
A quick overview of Microsoft Defender for Cloud.

A quick overview of Microsoft Defender for Cloud.

Comments
2 min read
Conquering the Cloud: A Practical Guide to Cloud Security

Conquering the Cloud: A Practical Guide to Cloud Security

1
Comments
3 min read
The rise and rise of the API economy (and why it won’t stop)

The rise and rise of the API economy (and why it won’t stop)

Comments
4 min read
Cybersecurity Best Practices for Small Businesses

Cybersecurity Best Practices for Small Businesses

1
Comments
2 min read
Understanding the OSI Model - Basics for Cybersecurity

Understanding the OSI Model - Basics for Cybersecurity

3
Comments
2 min read
Elevating Cybersecurity Consciousness

Elevating Cybersecurity Consciousness

1
Comments 1
2 min read
API Security Breaches: Learning from Past Incidents

API Security Breaches: Learning from Past Incidents

2
Comments
5 min read
Dancing | HackTheBox Write-up

Dancing | HackTheBox Write-up

5
Comments
3 min read
7 Top Strategies for Effective Bot Detection Revealed

7 Top Strategies for Effective Bot Detection Revealed

Comments
9 min read
Photon Lockdown | HackTheBox Write-up

Photon Lockdown | HackTheBox Write-up

7
Comments
3 min read
Fawn | HackTheBox Write-up

Fawn | HackTheBox Write-up

6
Comments
3 min read
SaaS Data Security: 7 Tips to Keep Your SaaS Data Secure

SaaS Data Security: 7 Tips to Keep Your SaaS Data Secure

2
Comments
7 min read
Alternate Data Streams - Good or Bad?

Alternate Data Streams - Good or Bad?

Comments
4 min read
Strategic Cyber Resilience: Enhancing Business Operations Through OT Security Solutions

Strategic Cyber Resilience: Enhancing Business Operations Through OT Security Solutions

Comments
6 min read
Best Practices for DevSecOps Implementation:

Best Practices for DevSecOps Implementation:

1
Comments
2 min read
loading...