DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is Tengine

What is Tengine

6
Comments
3 min read
How to Stop DDoS Attacks in in Go with Rate Limiting

How to Stop DDoS Attacks in in Go with Rate Limiting

2
Comments 1
3 min read
How Hackers Exploit Ansible for Configuration Attacks: A Technical Deep Dive

How Hackers Exploit Ansible for Configuration Attacks: A Technical Deep Dive

Comments
2 min read
Machine Learning in Cloud-Based Cybersecurity Automation

Machine Learning in Cloud-Based Cybersecurity Automation

Comments
3 min read
🚀 Unlocking Fine-Grained Access Control with Cerbos

🚀 Unlocking Fine-Grained Access Control with Cerbos

34
Comments 4
6 min read
🚀 AdminProber v1.1: The Ultimate Admin Panel Finder Tool for Penetration Testers and Ethical Hackers

🚀 AdminProber v1.1: The Ultimate Admin Panel Finder Tool for Penetration Testers and Ethical Hackers

7
Comments
3 min read
OAuth2, JWT, and JWKS: Using Amazon Cognito as IDP

OAuth2, JWT, and JWKS: Using Amazon Cognito as IDP

Comments
10 min read
Securing PHP Web Applications: Hands-On Practices

Securing PHP Web Applications: Hands-On Practices

3
Comments
2 min read
Supercharging AI Projects with Docwire SDK: The Developer's Edge

Supercharging AI Projects with Docwire SDK: The Developer's Edge

Comments
5 min read
Mastering Cybersecurity: Essential Tips for Developers to Protect Your Applications

Mastering Cybersecurity: Essential Tips for Developers to Protect Your Applications

2
Comments
3 min read
The Importance of Web Application Firewall defending against Cyber Threats.

The Importance of Web Application Firewall defending against Cyber Threats.

Comments
2 min read
6 Steps to Run API Automation Testing

6 Steps to Run API Automation Testing

2
Comments
6 min read
🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

Comments
2 min read
Boost Your Cybersecurity: Easy Guide to the Rust IP Port Sniffer!

Boost Your Cybersecurity: Easy Guide to the Rust IP Port Sniffer!

Comments
3 min read
Securing Your Node.js Application: A Comprehensive Guide

Securing Your Node.js Application: A Comprehensive Guide

8
Comments
11 min read
How Semantic Analysis Works in SafeLine WAF

How Semantic Analysis Works in SafeLine WAF

Comments
2 min read
Unprotected Functionality

Unprotected Functionality

Comments
1 min read
Visual Studio package security

Visual Studio package security

2
Comments
4 min read
Essential Linux Security Practices for DevSecOps Success

Essential Linux Security Practices for DevSecOps Success

2
Comments
2 min read
Fix Broken Authentication in Laravel: Step-by-Step Guide

Fix Broken Authentication in Laravel: Step-by-Step Guide

Comments
2 min read
Cybersecurity Basics: A Beginner's Guide

Cybersecurity Basics: A Beginner's Guide

4
Comments 1
4 min read
How to Effectively Assess the Security of Your Apps

How to Effectively Assess the Security of Your Apps

6
Comments
5 min read
The Intersection of Data Science and Cybersecurity

The Intersection of Data Science and Cybersecurity

4
Comments
3 min read
A walkthrough to Sofia Santos' OSINT Exercise #002

A walkthrough to Sofia Santos' OSINT Exercise #002

Comments
2 min read
Engineering the Unseen: My Work as a Software Engineer

Engineering the Unseen: My Work as a Software Engineer

10
Comments 1
3 min read
Top-Tier DSPM Tools 2024: A Buyer’s Guide to 8 Leading Solutions

Top-Tier DSPM Tools 2024: A Buyer’s Guide to 8 Leading Solutions

Comments
5 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments
3 min read
Insecure Direct Object References (IDOR) in Laravel

Insecure Direct Object References (IDOR) in Laravel

Comments
4 min read
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
How to Set Up a High Availability Environment with Two SafeLine

How to Set Up a High Availability Environment with Two SafeLine

5
Comments
2 min read
Introduction to Cybersecurity

Introduction to Cybersecurity

7
Comments 1
13 min read
Website Owner Must Know: X-Forwarded-For

Website Owner Must Know: X-Forwarded-For

7
Comments 1
2 min read
🔐 Why Your Team Needs Passbolt for Password Management

🔐 Why Your Team Needs Passbolt for Password Management

3
Comments
1 min read
🔐 Secure Your Apps with Best Practices ⬇️⬇️⬇️

🔐 Secure Your Apps with Best Practices ⬇️⬇️⬇️

8
Comments 3
1 min read
A Step-by-Step Guide to Running a SAST Test

A Step-by-Step Guide to Running a SAST Test

1
Comments
7 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Web vulnerability bounty rules update

Web vulnerability bounty rules update

2
Comments
1 min read
How to Test Effectiveness of a WAF (Web Application Firewall)

How to Test Effectiveness of a WAF (Web Application Firewall)

6
Comments
3 min read
How to Install a Private OpenVPN Server on Ubuntu 22.04

How to Install a Private OpenVPN Server on Ubuntu 22.04

1
Comments
10 min read
SafeLine WAF Waiting Room: The Terminator of HTTP Flood DDoS Attack

SafeLine WAF Waiting Room: The Terminator of HTTP Flood DDoS Attack

14
Comments
4 min read
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

2
Comments
2 min read
From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

Comments
6 min read
Reimagining cybersecurity for developers

Reimagining cybersecurity for developers

1
Comments
7 min read
Cloud Ransomware: Targeting Web Applications in 2024

Cloud Ransomware: Targeting Web Applications in 2024

2
Comments 4
2 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes

WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes

Comments
3 min read
DevSecOps?

DevSecOps?

5
Comments
3 min read
Top 10 SBOM Tools to Inventory Your App Components

Top 10 SBOM Tools to Inventory Your App Components

Comments
7 min read
Learning the basics of Osquery

Learning the basics of Osquery

Comments
4 min read
Exploiting Active Directory: How to Abuse Kerberos

Exploiting Active Directory: How to Abuse Kerberos

Comments
12 min read
Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

6
Comments 1
3 min read
Part 7: SQL Injection Series: Advanced SQL Injection Techniques

Part 7: SQL Injection Series: Advanced SQL Injection Techniques

5
Comments 1
4 min read
O Problema da Cibersegurança Atual

O Problema da Cibersegurança Atual

Comments
3 min read
AI-Driven Election Security: Safeguarding Democracy in the Digital Age

AI-Driven Election Security: Safeguarding Democracy in the Digital Age

5
Comments
5 min read
Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

Advanced Wi-Fi Hacking: Cracking WPA3 and Modern Wireless Security

5
Comments
3 min read
LDAP (Lightweight Directory Access Protocol

LDAP (Lightweight Directory Access Protocol

Comments
3 min read
Call, Send, and Transfer: The Payment gateway for Web3

Call, Send, and Transfer: The Payment gateway for Web3

5
Comments
2 min read
Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Comments
5 min read
Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Comments
5 min read
Understanding of Pulling WAF Definitions Updates

Understanding of Pulling WAF Definitions Updates

7
Comments
3 min read
How to Detect and Defend Against SQL Injection Attacks - Part 2

How to Detect and Defend Against SQL Injection Attacks - Part 2

7
Comments 1
4 min read
loading...