DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

πŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Preventing File Inclusion Vulnerabilities in Laravel Applications

Preventing File Inclusion Vulnerabilities in Laravel Applications

2
Comments 1
2 min read
Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

1
Comments
3 min read
Understanding Zero-Trust Architecture (ZTA)

Understanding Zero-Trust Architecture (ZTA)

5
Comments
4 min read
π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Understanding and Preventing Email Spoofing Through DMARC Reports: A Technical Analysis

Comments
2 min read
Non-Human Identity Security Strategy for Zero Trust Architecture

Non-Human Identity Security Strategy for Zero Trust Architecture

1
Comments
7 min read
Here's How Generative AI Can Be Used In Cybersecurity 00:25

Here's How Generative AI Can Be Used In Cybersecurity

7
Comments
1 min read
Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Comments 1
5 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
Remote Code Execution (RCE) in Laravel: Prevention & Example

Remote Code Execution (RCE) in Laravel: Prevention & Example

3
Comments
3 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

10
Comments
4 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

10
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

11
Comments
5 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

10
Comments
4 min read
πŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.