DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Tools and Methods for Cybersecurity Analysis

Tools and Methods for Cybersecurity Analysis

Comments 2
9 min read
Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Comments
2 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
Tutorial: Add Passkeys to a Remix App

Tutorial: Add Passkeys to a Remix App

1
Comments
2 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
Learn WebSec with Sain: Introduction

Learn WebSec with Sain: Introduction

Comments
3 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

1
Comments
5 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
Fostering Cloud Computing Security

Fostering Cloud Computing Security

Comments
4 min read
PicoCTF 2024: packer

PicoCTF 2024: packer

1
Comments 2
2 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Top 11 Website Security Software Solutions for 2024

Top 11 Website Security Software Solutions for 2024

Comments
10 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

1
Comments
6 min read
Unbreakable 2024: secrets-of-winter

Unbreakable 2024: secrets-of-winter

Comments
2 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 1
6 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
AWS GuardDuty for ATP (Advanced Threat Detection)

AWS GuardDuty for ATP (Advanced Threat Detection)

2
Comments
2 min read
The Essential NAS (Network-Attached Storage) Data Protection Manual: Effective Backup Techniques

The Essential NAS (Network-Attached Storage) Data Protection Manual: Effective Backup Techniques

Comments
3 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
PicoCTF 2024- CanYouSee

PicoCTF 2024- CanYouSee

Comments
2 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
TryHackMe- Compiled

TryHackMe- Compiled

1
Comments
2 min read
Unbreakable 2024: Easy-hide

Unbreakable 2024: Easy-hide

Comments
1 min read
Trickster- PicoCTF 2024

Trickster- PicoCTF 2024

Comments
2 min read
Passkeys in web3: Passkeys @ Binance

Passkeys in web3: Passkeys @ Binance

1
Comments
2 min read
Azure Key Vault

Azure Key Vault

1
Comments
4 min read
Children’s Introduction Guide to Zero Trust

Children’s Introduction Guide to Zero Trust

2
Comments
6 min read
Comprehensive Cybersecurity Bootcamp: Securing the Digital World

Comprehensive Cybersecurity Bootcamp: Securing the Digital World

1
Comments
2 min read
7 Essential SaaS Security Best Practices

7 Essential SaaS Security Best Practices

1
Comments
7 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

[CYBERSECURITY] IDS/IPS, syslog, SIEM e SOAR: ferramentas para monitoramento de redes

2
Comments
3 min read
What is Network Scanning

What is Network Scanning

Comments
4 min read
Automate identification of uncommon DNS requests with Cisco Umbrella API

Automate identification of uncommon DNS requests with Cisco Umbrella API

Comments 2
9 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
The Role of Emotional Intelligence in Leadership

The Role of Emotional Intelligence in Leadership

3
Comments
5 min read
Mastering Cybersecurity: Moving Beyond Common Mistakes

Mastering Cybersecurity: Moving Beyond Common Mistakes

Comments
2 min read
SQL Injection attack

SQL Injection attack

Comments
2 min read
Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Evaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the process

Comments
6 min read
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Comments
6 min read
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Comments
2 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

1
Comments
6 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
GUI vs CLI

GUI vs CLI

3
Comments
2 min read
Next-Level Methods for Managing Networks Efficiently in 2024

Next-Level Methods for Managing Networks Efficiently in 2024

2
Comments 1
2 min read
loading...