DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Dark Web and Its Impact on Data Privacy

Dark Web and Its Impact on Data Privacy

Comments
3 min read
Security Centralization for AWS Multi-account using Native Services

Security Centralization for AWS Multi-account using Native Services

Comments
14 min read
Desmontagem e o IDA Pro na AnĂĄlise de Programas

Desmontagem e o IDA Pro na AnĂĄlise de Programas

10
Comments
8 min read
Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
Implementing SSL VPN Using FortiGate in AWS Cloud

Implementing SSL VPN Using FortiGate in AWS Cloud

Comments
5 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

26
Comments 8
2 min read
Development of smart contracts on Foundry:

Development of smart contracts on Foundry:

Comments
1 min read
Securing Fedora Linux with SELinux: A Comprehensive Guide

Securing Fedora Linux with SELinux: A Comprehensive Guide

4
Comments
3 min read
Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Comments
2 min read
Goal-Based Penetration Testing

Goal-Based Penetration Testing

Comments
1 min read
Are FIDO Passkeys SCA and PSD2 Compliant?

Are FIDO Passkeys SCA and PSD2 Compliant?

2
Comments
3 min read
What is DSPM? Data Security Posture Management Explained

What is DSPM? Data Security Posture Management Explained

Comments
2 min read
Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Comments
3 min read
Top 11 Website Security Software Solutions for 2024

Top 11 Website Security Software Solutions for 2024

Comments
10 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Banking Passkeys: How Revolut Implemented Passkeys

Banking Passkeys: How Revolut Implemented Passkeys

2
Comments 1
3 min read
IAM Vs PAM: What Is The Difference?

IAM Vs PAM: What Is The Difference?

Comments
7 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
Aplicaçþes de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicaçþes de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Cybersecurity in Tech Era

Cybersecurity in Tech Era

Comments 2
3 min read
What is the DevSecOps Maturity Model (DSOMM)?

What is the DevSecOps Maturity Model (DSOMM)?

Comments
7 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

55
Comments 3
12 min read
Top 7 Web Application Security Tools

Top 7 Web Application Security Tools

1
Comments
8 min read
Azure Key Vault

Azure Key Vault

1
Comments
4 min read
Microsoft Entra (Azure AD) Passkeys: Elevating Employee Authentication

Microsoft Entra (Azure AD) Passkeys: Elevating Employee Authentication

2
Comments
3 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

13
Comments 6
5 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

40
Comments 4
6 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

5
Comments
8 min read
Man In The Middle Attack (MITM) Part 1 — ARP Spoofing

Man In The Middle Attack (MITM) Part 1 — ARP Spoofing

Comments
15 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
How Passkeys Enable Invisible MFA

How Passkeys Enable Invisible MFA

5
Comments
2 min read
Unleashing Shodany: Elevating Ruby Development with Seamless Shodan Integration

Unleashing Shodany: Elevating Ruby Development with Seamless Shodan Integration

1
Comments
2 min read
Common ports

Common ports

Comments
1 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
How to Find & Secure Exposed Microsoft Azure Buckets in 2024

How to Find & Secure Exposed Microsoft Azure Buckets in 2024

Comments
5 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

8
Comments
3 min read
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability

Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability

3
Comments
39 min read
Threat Detection and Response (TDR): What is it and Do You Need it?

Threat Detection and Response (TDR): What is it and Do You Need it?

Comments
5 min read
Children’s Introduction Guide to Zero Trust

Children’s Introduction Guide to Zero Trust

2
Comments
6 min read
ChiBrrCon IV: Understanding risks and the role of the CISO

ChiBrrCon IV: Understanding risks and the role of the CISO

1
Comments
7 min read
What is Network Scanning

What is Network Scanning

Comments
4 min read
HackTheBox - Writeup Drive [Retired]

HackTheBox - Writeup Drive [Retired]

Comments 1
15 min read
Technology Trends in Focus: Examining the Forces Driving Innovation

Technology Trends in Focus: Examining the Forces Driving Innovation

1
Comments 1
3 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

Comments
11 min read
Designing Security Workflows using Gitlab CI Templates

Designing Security Workflows using Gitlab CI Templates

3
Comments
5 min read
What is Website Defacement Attack?

What is Website Defacement Attack?

Comments
2 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Next-Level Methods for Managing Networks Efficiently in 2024

Next-Level Methods for Managing Networks Efficiently in 2024

2
Comments 1
2 min read
Threat Detection and Response (TDR): What is it and Do You Need it?

Threat Detection and Response (TDR): What is it and Do You Need it?

Comments
5 min read
Cloud cyber attacks

Cloud cyber attacks

Comments
2 min read
Wi-Fi Deauthentication attack

Wi-Fi Deauthentication attack

Comments
3 min read
MITM attack

MITM attack

Comments
3 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Cybersecurity in the IoT Era: Protecting Your Digital Footprint

Cybersecurity in the IoT Era: Protecting Your Digital Footprint

Comments
8 min read
Dynamic Talks | OWASP API SECURITY TOP 10 - 2023

Dynamic Talks | OWASP API SECURITY TOP 10 - 2023

Comments
1 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
Understanding WEP and WPA-PSK in Wireless Router Security

Understanding WEP and WPA-PSK in Wireless Router Security

Comments
3 min read
loading...