DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Navigating the Future of Open Source Security: Insights from Industry Leaders

Navigating the Future of Open Source Security: Insights from Industry Leaders

Comments
2 min read
Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Essential Guide: Five Critical Cybersecurity Threats for MSPs in 2024

Comments
2 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

1
Comments
6 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
GUI vs CLI

GUI vs CLI

3
Comments
2 min read
Next-Level Methods for Managing Networks Efficiently in 2024

Next-Level Methods for Managing Networks Efficiently in 2024

2
Comments 1
2 min read
[PT-BR] Desmontagem e o IDA Pro na AnĂĄlise de Programas

[PT-BR] Desmontagem e o IDA Pro na AnĂĄlise de Programas

10
Comments
8 min read
Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
Implementing SSL VPN Using FortiGate in AWS Cloud

Implementing SSL VPN Using FortiGate in AWS Cloud

Comments
5 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

25
Comments 7
2 min read
Securing Fedora Linux with SELinux: A Comprehensive Guide

Securing Fedora Linux with SELinux: A Comprehensive Guide

2
Comments
3 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

6
Comments
3 min read
Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Decoding the Target Data Breach: Cybersecurity Chronicles and Imperatives

Comments
3 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
IAM Vs PAM: What Is The Difference?

IAM Vs PAM: What Is The Difference?

Comments
7 min read
Designing Security Workflows using Gitlab CI Templates

Designing Security Workflows using Gitlab CI Templates

3
Comments
5 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
Cybersecurity in Tech Era

Cybersecurity in Tech Era

Comments 2
3 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

10
Comments 3
12 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
The Complete Guide to Passing an ISO 27001 Audit

The Complete Guide to Passing an ISO 27001 Audit

1
Comments
9 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

38
Comments 4
6 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
How Passkeys Enable Invisible MFA

How Passkeys Enable Invisible MFA

5
Comments
2 min read
Unleashing Shodany: Elevating Ruby Development with Seamless Shodan Integration

Unleashing Shodany: Elevating Ruby Development with Seamless Shodan Integration

Comments
2 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
ChiBrrCon IV: Understanding risks and the role of the CISO

ChiBrrCon IV: Understanding risks and the role of the CISO

1
Comments
7 min read
HackTheBox - Writeup Drive [Retired]

HackTheBox - Writeup Drive [Retired]

Comments 1
15 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

2
Comments
3 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

2
Comments
3 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

5
Comments
4 min read
INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

7
Comments 4
1 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

4
Comments
5 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

6
Comments 3
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
How to Get Free Cybersecurity Training?

How to Get Free Cybersecurity Training?

Comments
3 min read
🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

Comments
3 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
Cross-Device Passkey Sync Between Web, iOS, Android App

Cross-Device Passkey Sync Between Web, iOS, Android App

3
Comments
2 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Phishing Attack

Phishing Attack

Comments
2 min read
Why developers should learn hacking (and vice versa)

Why developers should learn hacking (and vice versa)

Comments
2 min read
How to Improve Your Website Security in 2024

How to Improve Your Website Security in 2024

2
Comments
5 min read
🌟 Mastering the Art of Consistency in Tech: My Journey and Strategies 🌟

🌟 Mastering the Art of Consistency in Tech: My Journey and Strategies 🌟

3
Comments
3 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Dealing With GitHub Password Authentication Deprecation

Dealing With GitHub Password Authentication Deprecation

1
Comments
4 min read
How to Implement Basic Access Authentication in Spring Boot

How to Implement Basic Access Authentication in Spring Boot

Comments
6 min read
loading...