DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
GitHub Security Best Practices – 15 Tips To Keep In Mind

GitHub Security Best Practices – 15 Tips To Keep In Mind

5
Comments
11 min read
Debug mTLS HTTPS connections using Wireshark

Debug mTLS HTTPS connections using Wireshark

2
Comments
5 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Advanced Wireshark Scripts for Intrusion Detection

Advanced Wireshark Scripts for Intrusion Detection

5
Comments
4 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

11
Comments
6 min read
Simple Wireshark Scripts for Easy Network Forensics

Simple Wireshark Scripts for Easy Network Forensics

20
Comments
3 min read
Types of Privilege Escalation Attacks

Types of Privilege Escalation Attacks

Comments
3 min read
The Impressive Evolution of Ransomware Code

The Impressive Evolution of Ransomware Code

2
Comments 1
10 min read
Improve Nmap Performance with These Brilliant Scripts

Improve Nmap Performance with These Brilliant Scripts

6
Comments
4 min read
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

9
Comments
4 min read
Enable Flow Logs for your VPC and collect all traffic in and out of your VPC network

Enable Flow Logs for your VPC and collect all traffic in and out of your VPC network

1
Comments
4 min read
A Theoretically Devastating Cyber Attack on America’s Gas Stations:

A Theoretically Devastating Cyber Attack on America’s Gas Stations:

1
Comments
3 min read
Generate cryptographically-protected passwords with PHP

Generate cryptographically-protected passwords with PHP

1
Comments 1
1 min read
The history of HTTPS

The history of HTTPS

9
Comments
4 min read
High level guide for developing IBM QRadar Apps

High level guide for developing IBM QRadar Apps

6
Comments
4 min read
Staying Ahead in the Cybersecurity Race: Tips & Strategies

Staying Ahead in the Cybersecurity Race: Tips & Strategies

Comments
4 min read
Hostname Verification: Preventing Man-in-the-Middle Attacks

Hostname Verification: Preventing Man-in-the-Middle Attacks

Comments
3 min read
How to Avoid 5 Mistakes While Choosing the Right Identity Brokerage for Your B2B SaaS

How to Avoid 5 Mistakes While Choosing the Right Identity Brokerage for Your B2B SaaS

Comments
4 min read
The Ultimate Guide to Web Application Security (As a developer)

The Ultimate Guide to Web Application Security (As a developer)

Comments
4 min read
Common Misconceptions About TryHackMe

Common Misconceptions About TryHackMe

2
Comments
2 min read
How to Setup Semgrep Rules for Optimal SAST Scanning

How to Setup Semgrep Rules for Optimal SAST Scanning

1
Comments
7 min read
The Summary Of Spring Security Authorization Bypass on Java

The Summary Of Spring Security Authorization Bypass on Java

Comments
12 min read
WebLogic Deserialization Vulnerability - CVE-2023-21839

WebLogic Deserialization Vulnerability - CVE-2023-21839

1
Comments
3 min read
Top Cybersecurity Tools

Top Cybersecurity Tools

1
Comments
2 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
What Does Identity Provider Actually Mean?

What Does Identity Provider Actually Mean?

3
Comments
2 min read
Top 5 Auth0 Alternatives for SSO

Top 5 Auth0 Alternatives for SSO

1
Comments
9 min read
Building a Budget Red Team Implant

Building a Budget Red Team Implant

Comments 1
6 min read
Bypass IP Restrictions with Burp Suite.

Bypass IP Restrictions with Burp Suite.

1
Comments
5 min read
Starting from nowhere

Starting from nowhere

3
Comments 3
1 min read
For better or worse: How APIs impact Cloud security

For better or worse: How APIs impact Cloud security

Comments
5 min read
How to write a GitLab backup script and why (not) to do it?

How to write a GitLab backup script and why (not) to do it?

Comments
6 min read
Secure Systems: A Quick Introduction to 4 Types of Cybersecurity

Secure Systems: A Quick Introduction to 4 Types of Cybersecurity

1
Comments 1
10 min read
🛜 What is ARP Spoofing?

🛜 What is ARP Spoofing?

3
Comments
8 min read
Common Web Security Attacks and Top Tips to Protect Your Website

Common Web Security Attacks and Top Tips to Protect Your Website

9
Comments
2 min read
iptables rules that every Linux user should have - part one

iptables rules that every Linux user should have - part one

5
Comments
4 min read
What Does 2FA Actually Mean?

What Does 2FA Actually Mean?

3
Comments
3 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

11
Comments
4 min read
Managing network security aspects in the public cloud

Managing network security aspects in the public cloud

2
Comments
4 min read
Tutorial: DNS Enumeration using Python

Tutorial: DNS Enumeration using Python

11
Comments 2
3 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
A web security story from 2008: silently securing JSON.parse

A web security story from 2008: silently securing JSON.parse

7
Comments 1
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Understanding the nature of XSS

Understanding the nature of XSS

Comments
6 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
What is SAML and how SAML authentication works?

What is SAML and how SAML authentication works?

2
Comments
9 min read
Coding a Port Scanner with Python

Coding a Port Scanner with Python

6
Comments
3 min read
The Importance of Security Operations Center (SOC)

The Importance of Security Operations Center (SOC)

5
Comments
8 min read
Best Practices for Building a Comprehensive Enterprise Data Security Strategy

Best Practices for Building a Comprehensive Enterprise Data Security Strategy

7
Comments
10 min read
SPF, DKIM and DMARC

SPF, DKIM and DMARC

1
Comments
3 min read
The (non-secure) MD5 Hash Algorithm

The (non-secure) MD5 Hash Algorithm

2
Comments
5 min read
How to use Burp Suite through a socks5 proxy with proxychains and chisel

How to use Burp Suite through a socks5 proxy with proxychains and chisel

19
Comments 1
4 min read
Hack The Box Writeup: Shoppy

Hack The Box Writeup: Shoppy

1
Comments
22 min read
Symfony Station Communiqué — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

3
Comments
10 min read
10 Essential Steps for Web Application Security Testing

10 Essential Steps for Web Application Security Testing

1
Comments
8 min read
Converting string to enum at the cost of 50 GB: CVE-2020-36620

Converting string to enum at the cost of 50 GB: CVE-2020-36620

14
Comments 6
6 min read
Comparing Confidential Computing Alternatives in the Cloud

Comparing Confidential Computing Alternatives in the Cloud

5
Comments 3
4 min read
Symfony Station Communiqué — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

4
Comments
11 min read
What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

3
Comments
6 min read
CIEM vs. CSPM: What is it and Which do I Need?

CIEM vs. CSPM: What is it and Which do I Need?

1
Comments
6 min read
loading...