DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cloud cyber attacks

Cloud cyber attacks

Comments
2 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Cybersecurity in the IoT Era: Protecting Your Digital Footprint

Cybersecurity in the IoT Era: Protecting Your Digital Footprint

Comments
8 min read
Dynamic Talks | OWASP API SECURITY TOP 10 - 2023

Dynamic Talks | OWASP API SECURITY TOP 10 - 2023

Comments
1 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

2
Comments
3 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
Understanding WEP and WPA-PSK in Wireless Router Security

Understanding WEP and WPA-PSK in Wireless Router Security

Comments
3 min read
Passwordless Authentication is the future !?

Passwordless Authentication is the future !?

Comments
3 min read
Beyond Rubrik: An In-Depth Analysis of Competing Backup and Recovery Programs

Beyond Rubrik: An In-Depth Analysis of Competing Backup and Recovery Programs

Comments
3 min read
Why File Backup is Your Best Defense Against Data Loss

Why File Backup is Your Best Defense Against Data Loss

Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

3
Comments
3 min read
Feels like I am starting from scratch after a computer science degree.....

Feels like I am starting from scratch after a computer science degree.....

Comments
1 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

6
Comments
4 min read
INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
The Future of Cyber Security: Trends to Watch in 2024

The Future of Cyber Security: Trends to Watch in 2024

Comments
3 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

7
Comments 4
1 min read
Quit Smoking, Start H@ckN!

Quit Smoking, Start H@ckN!

Comments
3 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

4
Comments
5 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

6
Comments 3
4 min read
5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
5 platform that pay huge if you're an Ethical H4CK3R

5 platform that pay huge if you're an Ethical H4CK3R

Comments
2 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
How to Get Free Cybersecurity Training?

How to Get Free Cybersecurity Training?

Comments
3 min read
🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

🎣 Phishing Websites: When Web Development and Cybersecurity Come Together

Comments
3 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
What is a Rootkit?

What is a Rootkit?

Comments
2 min read
Cross-Device Passkey Sync Between Web, iOS, Android App

Cross-Device Passkey Sync Between Web, iOS, Android App

4
Comments
2 min read
11 tips to spot Phishing Attack

11 tips to spot Phishing Attack

Comments
5 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Phishing Attack

Phishing Attack

Comments
2 min read
Why developers should learn hacking (and vice versa)

Why developers should learn hacking (and vice versa)

Comments
2 min read
How to Improve Your Website Security in 2024

How to Improve Your Website Security in 2024

2
Comments
5 min read
What is Spyware?

What is Spyware?

1
Comments
2 min read
What is Adware?

What is Adware?

Comments
2 min read
The Essential Guide to SaaS Compliance

The Essential Guide to SaaS Compliance

Comments
6 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Embracing the Code: A Journey from Curious Kid to Microsoft Project Manager

Embracing the Code: A Journey from Curious Kid to Microsoft Project Manager

Comments
3 min read
🌟 Mastering the Art of Consistency in Tech: My Journey and Strategies 🌟

🌟 Mastering the Art of Consistency in Tech: My Journey and Strategies 🌟

3
Comments
3 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Dealing With GitHub Password Authentication Deprecation

Dealing With GitHub Password Authentication Deprecation

1
Comments
4 min read
How to Implement Basic Access Authentication in Spring Boot

How to Implement Basic Access Authentication in Spring Boot

Comments
6 min read
Secure Development Practices to Safeguard Your Software

Secure Development Practices to Safeguard Your Software

Comments
3 min read
How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin

How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin

Comments
5 min read
Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

1
Comments
2 min read
Entering Tux & CyberSec

Entering Tux & CyberSec

Comments
3 min read
Navigating the Risks of Third-Party Libraries in Web

Navigating the Risks of Third-Party Libraries in Web

Comments
4 min read
DevSecOps 101: What is DevSecOps?

DevSecOps 101: What is DevSecOps?

Comments
5 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
Empowering Cybersecurity: A Guide to Enhancing Awareness and Resilience

Empowering Cybersecurity: A Guide to Enhancing Awareness and Resilience

Comments
2 min read
Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA

Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA

Comments
4 min read
What is a Supply Chain Attack?

What is a Supply Chain Attack?

Comments
3 min read
Redeemer | HackTheBox Write-up

Redeemer | HackTheBox Write-up

5
Comments
3 min read
21 Ecommerce Fraud Protection Policies to Implement Now

21 Ecommerce Fraud Protection Policies to Implement Now

Comments
6 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
Developer Education - GitGuardian Supports Your Learning Style

Developer Education - GitGuardian Supports Your Learning Style

1
Comments
9 min read
loading...