DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Managing network security aspects in the public cloud

Managing network security aspects in the public cloud

2
Comments
4 min read
Tutorial: DNS Enumeration using Python

Tutorial: DNS Enumeration using Python

11
Comments 3
3 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
A web security story from 2008: silently securing JSON.parse

A web security story from 2008: silently securing JSON.parse

7
Comments 1
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Understanding the nature of XSS

Understanding the nature of XSS

Comments
6 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
What is SAML and how SAML authentication works?

What is SAML and how SAML authentication works?

2
Comments
9 min read
Coding a Port Scanner with Python

Coding a Port Scanner with Python

6
Comments
3 min read
The Importance of Security Operations Center (SOC)

The Importance of Security Operations Center (SOC)

5
Comments
8 min read
Best Practices for Building a Comprehensive Enterprise Data Security Strategy

Best Practices for Building a Comprehensive Enterprise Data Security Strategy

7
Comments
10 min read
SPF, DKIM and DMARC

SPF, DKIM and DMARC

1
Comments
3 min read
The (non-secure) MD5 Hash Algorithm

The (non-secure) MD5 Hash Algorithm

2
Comments
5 min read
How to use Burp Suite through a socks5 proxy with proxychains and chisel

How to use Burp Suite through a socks5 proxy with proxychains and chisel

21
Comments 1
4 min read
Hack The Box Writeup: Shoppy

Hack The Box Writeup: Shoppy

1
Comments
22 min read
Symfony Station Communiqué — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

3
Comments
10 min read
10 Essential Steps for Web Application Security Testing

10 Essential Steps for Web Application Security Testing

1
Comments
8 min read
Converting string to enum at the cost of 50 GB: CVE-2020-36620

Converting string to enum at the cost of 50 GB: CVE-2020-36620

14
Comments 6
6 min read
Comparing Confidential Computing Alternatives in the Cloud

Comparing Confidential Computing Alternatives in the Cloud

5
Comments 3
4 min read
Symfony Station Communiqué — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

4
Comments
11 min read
What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

3
Comments
6 min read
CIEM vs. CSPM: What is it and Which do I Need?

CIEM vs. CSPM: What is it and Which do I Need?

1
Comments
6 min read
Start your Career in Cyber Security

Start your Career in Cyber Security

4
Comments
2 min read
Introdução ao Linux: comandos básicos do terminal

Introdução ao Linux: comandos básicos do terminal

1
Comments
3 min read
Train Url prediction

Train Url prediction

1
Comments
4 min read
Symfony Station Communiqué — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

Symfony Station Communiqué — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

3
Comments
12 min read
Part 2: Useful OSINT Tools

Part 2: Useful OSINT Tools

1
Comments
2 min read
Hack Metasploitable machine in 5 ways using Kali Linux 🤯😈

Hack Metasploitable machine in 5 ways using Kali Linux 🤯😈

36
Comments
5 min read
Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Searchable Symmetric Encryption (SSE) Basic Understanding In Go

Comments
4 min read
What Does Passwordless Actually Mean?

What Does Passwordless Actually Mean?

2
Comments
2 min read
Conhecendo a Área de Segurança Cibernética

Conhecendo a Área de Segurança Cibernética

4
Comments
3 min read
Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active Defense

Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active Defense

1
Comments
7 min read
Symfony Station Communiqué — 03 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 03 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

2
Comments
13 min read
How severe is the cyber security expert shortage? Which cyber security job shows the most potential for growth?

How severe is the cyber security expert shortage? Which cyber security job shows the most potential for growth?

2
Comments
2 min read
NPM Audit: 5 Ways to Use it to Protect Your Code

NPM Audit: 5 Ways to Use it to Protect Your Code

2
Comments
8 min read
Symfony Station Communiqué — 24 February 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 24 February 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

3
Comments
11 min read
Can JavaScript do Everything Python Can?

Can JavaScript do Everything Python Can?

3
Comments
3 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
HTTP - File Transfers for CTFs and Red-Teamers Pt. 1

HTTP - File Transfers for CTFs and Red-Teamers Pt. 1

Comments
12 min read
Implementing Your Own Time-Based OTP Generator

Implementing Your Own Time-Based OTP Generator

7
Comments
12 min read
What are Sql and NoSql Databases?

What are Sql and NoSql Databases?

2
Comments 1
5 min read
Symfony Station Communiqué — 17 February 2023. A look at Symfony, Drupal, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 17 February 2023. A look at Symfony, Drupal, Cybersecurity, and Fediverse news!

2
Comments
10 min read
Princípios de Segurança Cibernética

Princípios de Segurança Cibernética

2
Comments
7 min read
Protect Your Website from Blind Cross-Site Scripting

Protect Your Website from Blind Cross-Site Scripting

2
Comments 3
6 min read
10 Best Practices to keep your API secure

10 Best Practices to keep your API secure

4
Comments 1
2 min read
IAM Best Practices [cheat sheet included]

IAM Best Practices [cheat sheet included]

1
Comments
10 min read
The Dark Side of ChatGPT: How Scammers are Abusing AI Technology

The Dark Side of ChatGPT: How Scammers are Abusing AI Technology

1
Comments
11 min read
Know About HTTPs Security

Know About HTTPs Security

1
Comments
4 min read
Symfony Station Communiqué — 03 February 2023. A look at Symfony, Drupal, PHP, and Cybersecurity News!

Symfony Station Communiqué — 03 February 2023. A look at Symfony, Drupal, PHP, and Cybersecurity News!

3
Comments
13 min read
Build Your First Port Scanner using Python

Build Your First Port Scanner using Python

10
Comments 6
5 min read
Breaking the Limits of Traditional Cyber Threat Detection with Memgraph

Breaking the Limits of Traditional Cyber Threat Detection with Memgraph

Comments
7 min read
Docker Best Practices: Security

Docker Best Practices: Security

5
Comments 2
4 min read
Symfony Station Communiqué — 27 January 2023. A look at Symfony, Drupal, PHP, and Cybersecurity news!

Symfony Station Communiqué — 27 January 2023. A look at Symfony, Drupal, PHP, and Cybersecurity news!

5
Comments
12 min read
Authentication vs. Authorization – What's the Difference?

Authentication vs. Authorization – What's the Difference?

Comments
7 min read
SAST: how code analysis tools look for security flaws

SAST: how code analysis tools look for security flaws

2
Comments
14 min read
Efficient Threat Detection in Cybersecurity with Memgraph

Efficient Threat Detection in Cybersecurity with Memgraph

Comments
5 min read
How I obtained my CISSP

How I obtained my CISSP

2
Comments
4 min read
wazuh agent as a docker image

wazuh agent as a docker image

18
Comments
4 min read
Phishing using Google Ads - An awareness

Phishing using Google Ads - An awareness

2
Comments 2
2 min read
Stay Ahead of Cyber Threats with Graph Databases

Stay Ahead of Cyber Threats with Graph Databases

Comments
9 min read
loading...