DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cyber Security Analyst vs. Cyber Security Consultant

Cyber Security Analyst vs. Cyber Security Consultant

2
Comments
4 min read
Introduction to Break-Glass in Cloud Environments

Introduction to Break-Glass in Cloud Environments

4
Comments
4 min read
Securing Connections: A Comprehensive Guide to IPSec and VPN Mastery

Securing Connections: A Comprehensive Guide to IPSec and VPN Mastery

1
Comments
9 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

81
Comments 16
8 min read
Passkeys Bluetooth: Cross-Platform Authentication

Passkeys Bluetooth: Cross-Platform Authentication

3
Comments
2 min read
On the joy of learning and bypassing brute-force protection

On the joy of learning and bypassing brute-force protection

4
Comments
4 min read
Exploring Broken Access Control

Exploring Broken Access Control

1
Comments
5 min read
Ensuring effective cloud security: Best practices and real-world insights

Ensuring effective cloud security: Best practices and real-world insights

3
Comments
8 min read
Unveiling the World of Ethical Hacking: Navigating Ethical Hacking Courses

Unveiling the World of Ethical Hacking: Navigating Ethical Hacking Courses

1
Comments
4 min read
OnlyFans Passkey Implementation Analyzed

OnlyFans Passkey Implementation Analyzed

2
Comments
2 min read
Edge Computing in IoT: 7 Reasons to Take IoT to the Edge

Edge Computing in IoT: 7 Reasons to Take IoT to the Edge

Comments
8 min read
Bitwarden Developer Survey 2024: Devs Love Passkeys

Bitwarden Developer Survey 2024: Devs Love Passkeys

2
Comments
2 min read
Enhancing Cybersecurity with Ruby: A Comprehensive Guide

Enhancing Cybersecurity with Ruby: A Comprehensive Guide

8
Comments
3 min read
Nintendo Passkey Implementation Analyzed

Nintendo Passkey Implementation Analyzed

1
Comments
2 min read
TikTok Passkey Implementation Analyzed

TikTok Passkey Implementation Analyzed

2
Comments
2 min read
Samsung Passkey Updates: What’s New?

Samsung Passkey Updates: What’s New?

9
Comments
2 min read
Cross Site Scripting attacks (XSS)

Cross Site Scripting attacks (XSS)

7
Comments
5 min read
Vulnerable and Outdated Components

Vulnerable and Outdated Components

7
Comments
4 min read
October is Cybersecurity Awareness Month: What and Why

October is Cybersecurity Awareness Month: What and Why

1
Comments
2 min read
SQL Injections at Work

SQL Injections at Work

1
Comments
4 min read
Extensive Guide to Gnu Privacy Guard (GPG)

Extensive Guide to Gnu Privacy Guard (GPG)

1
Comments
10 min read
I'm a little iffy on Passkeys

I'm a little iffy on Passkeys

1
Comments
6 min read
DLLs in Rust🦀

DLLs in Rust🦀

8
Comments
4 min read
Diving Deep into AI with open-appsec: A Personal Journey of Discovery and Growth

Diving Deep into AI with open-appsec: A Personal Journey of Discovery and Growth

4
Comments
2 min read
Types of Cybersecurity

Types of Cybersecurity

1
Comments
2 min read
Amazon Passkey Implementation Analyzed

Amazon Passkey Implementation Analyzed

1
Comments
2 min read
Cybersecurity and AI deep in the heart of Texas Cyber Summit

Cybersecurity and AI deep in the heart of Texas Cyber Summit

1
Comments
11 min read
🔒🌐 Cybersecurity in the Digital Age 🌐🔒

🔒🌐 Cybersecurity in the Digital Age 🌐🔒

7
Comments
6 min read
CTF Challenges: Reconnaissance

CTF Challenges: Reconnaissance

Comments
3 min read
Types of Servers in Computing

Types of Servers in Computing

5
Comments
2 min read
Mobile Security Tools part 1: scrcpy

Mobile Security Tools part 1: scrcpy

1
Comments
2 min read
Harnessing Automation for Cybersecurity in 7 Steps

Harnessing Automation for Cybersecurity in 7 Steps

2
Comments
2 min read
Cybersecurity Resources for beginners

Cybersecurity Resources for beginners

6
Comments 4
2 min read
Click, Install, Browse: Easy Security Extensions for Everyone

Click, Install, Browse: Easy Security Extensions for Everyone

5
Comments
4 min read
PELUSA: Detectando phishing mediante Machine Learning

PELUSA: Detectando phishing mediante Machine Learning

1
Comments 2
4 min read
A Step-by-Step Guide to Conducting a Cyber Security Risk Assessment

A Step-by-Step Guide to Conducting a Cyber Security Risk Assessment

1
Comments
4 min read
The best application security tool is education

The best application security tool is education

10
Comments
4 min read
Your Key to Understanding AES Encryption

Your Key to Understanding AES Encryption

Comments
2 min read
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784

KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784

7
Comments
4 min read
Exploring the Dark Web’s Hidden Secrets

Exploring the Dark Web’s Hidden Secrets

1
Comments
14 min read
dev up 2023: Leveling up our dev skills, security posture, and careers

dev up 2023: Leveling up our dev skills, security posture, and careers

1
Comments
10 min read
Three Recent Examples of Why You Need to Know How Vulnerable Your Secrets Are

Three Recent Examples of Why You Need to Know How Vulnerable Your Secrets Are

2
Comments
4 min read
Mr-Robot (not the show...kind of)

Mr-Robot (not the show...kind of)

1
Comments
9 min read
Understanding and Avoiding Modern Cyber Risks - A Detailed Guide for All

Understanding and Avoiding Modern Cyber Risks - A Detailed Guide for All

2
Comments
5 min read
The cost of false positives in software security, Part 2: Large applications

The cost of false positives in software security, Part 2: Large applications

5
Comments
4 min read
🌐🛡️ Mastering Nmap Commands: Unleash Your Network Scanning Superpowers! 🛡️🌐

🌐🛡️ Mastering Nmap Commands: Unleash Your Network Scanning Superpowers! 🛡️🌐

4
Comments
2 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
How to setup Burp Suite on Android

How to setup Burp Suite on Android

1
Comments
4 min read
Should we use VPN on browsing?

Should we use VPN on browsing?

Comments
4 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
The cost of false positives in software security, Part 1: Small applications

The cost of false positives in software security, Part 1: Small applications

6
Comments
6 min read
Top 10 Hackers

Top 10 Hackers

12
Comments 11
9 min read
Cybersecurity In The World Of Generative AI

Cybersecurity In The World Of Generative AI

1
Comments 2
2 min read
Why acquiring a Cyber Security Certification is good career option?

Why acquiring a Cyber Security Certification is good career option?

Comments
2 min read
Why you need Interactive Application Security Testing (IAST) 🔒

Why you need Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Análisis dinámico de aplicaciones web con OWASP ZAP

Análisis dinámico de aplicaciones web con OWASP ZAP

1
Comments 2
9 min read
Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

2
Comments
11 min read
Software Testing in Rust for Developers

Software Testing in Rust for Developers

Comments 2
8 min read
A Beginner's Guide to Bug Bounty Programs

A Beginner's Guide to Bug Bounty Programs

Comments
2 min read
loading...