DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

2
Comments 2
4 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

3
Comments
2 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

2
Comments
6 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 2
6 min read
Unbreakable 2024: secrets-of-winter

Unbreakable 2024: secrets-of-winter

Comments
2 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments 1
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
SQL Injection - Course Content

SQL Injection - Course Content

1
Comments
4 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

22
Comments
6 min read
Advanced Analytics and Monitoring in Cyber Threat Detection

Advanced Analytics and Monitoring in Cyber Threat Detection

1
Comments
2 min read
The Essential NAS (Network-Attached Storage) Data Protection Manual: Effective Backup Techniques

The Essential NAS (Network-Attached Storage) Data Protection Manual: Effective Backup Techniques

Comments
3 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

2
Comments
3 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

2
Comments
2 min read
Information Disclosure

Information Disclosure

2
Comments
5 min read
PicoCTF 2024- CanYouSee

PicoCTF 2024- CanYouSee

Comments
2 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
Tutorial: Add Passkeys to a Remix App

Tutorial: Add Passkeys to a Remix App

1
Comments
2 min read
TryHackMe- Compiled

TryHackMe- Compiled

2
Comments
2 min read
Unbreakable 2024: Easy-hide

Unbreakable 2024: Easy-hide

Comments
1 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Trickster- PicoCTF 2024

Trickster- PicoCTF 2024

1
Comments
2 min read
Passkeys in web3: Passkeys @ Binance

Passkeys in web3: Passkeys @ Binance

1
Comments
2 min read
Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Deletion of Data = Integrity Impact, Deletion of Data Availability Impact

Comments
2 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
PySniffer: A Wireless Network Tool

PySniffer: A Wireless Network Tool

1
Comments
4 min read
14 Cybersecurity Awareness Topics You Need to Cover

14 Cybersecurity Awareness Topics You Need to Cover

Comments
7 min read
Is 2-Step-Verification (2SV) or 2-Factor-Authentication (2FA) Better?

Is 2-Step-Verification (2SV) or 2-Factor-Authentication (2FA) Better?

1
Comments
2 min read
Comprehensive Cybersecurity Bootcamp: Securing the Digital World

Comprehensive Cybersecurity Bootcamp: Securing the Digital World

1
Comments
2 min read
7 Essential SaaS Security Best Practices

7 Essential SaaS Security Best Practices

1
Comments
7 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
What is Identity Governance: 5 Steps to Build Your Framework

What is Identity Governance: 5 Steps to Build Your Framework

Comments
6 min read
Exploring JavaScript Obfuscation in Web Development and Cybersecurity

Exploring JavaScript Obfuscation in Web Development and Cybersecurity

Comments
3 min read
Automate identification of uncommon DNS requests with Cisco Umbrella API

Automate identification of uncommon DNS requests with Cisco Umbrella API

1
Comments 2
9 min read
AWS GuardDuty for ATP (Advanced Threat Detection)

AWS GuardDuty for ATP (Advanced Threat Detection)

3
Comments
2 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
The Role of Emotional Intelligence in Leadership

The Role of Emotional Intelligence in Leadership

3
Comments
5 min read
Mastering Cybersecurity: Moving Beyond Common Mistakes

Mastering Cybersecurity: Moving Beyond Common Mistakes

Comments
2 min read
SQL Injection attack

SQL Injection attack

Comments
2 min read
Host your own CTF for free đź’¸ (CTFd Setup Guide)

Host your own CTF for free đź’¸ (CTFd Setup Guide)

54
Comments
3 min read
how to learn hacking

how to learn hacking

Comments
1 min read
Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!

Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!

Comments
2 min read
Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Comments
6 min read
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Fostering Cloud Computing Security

Fostering Cloud Computing Security

Comments
4 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Comments
6 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Comments
2 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

1
Comments
6 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Comments
2 min read
[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

6
Comments
3 min read
loading...