DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
End-To-End Encryption

End-To-End Encryption

Comments
3 min read
How Hackers Intercept Your Messages: The Silent Cyber Threat You Need to Know

How Hackers Intercept Your Messages: The Silent Cyber Threat You Need to Know

Comments
3 min read
Content Security Policy Bypass in Laravel: Risks and Mitigations

Content Security Policy Bypass in Laravel: Risks and Mitigations

9
Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Anyone Can Become Certified in Cybersecurity

Anyone Can Become Certified in Cybersecurity

Comments
3 min read
Your Favorite Apps Are Spying on You (Yes, Even That One) 👀

Your Favorite Apps Are Spying on You (Yes, Even That One) 👀

Comments
2 min read
Building Secure Cloud Infrastructure: Cyber Security Best Practices in AWS & GCP

Building Secure Cloud Infrastructure: Cyber Security Best Practices in AWS & GCP

9
Comments
1 min read
Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Comments
3 min read
US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

1
Comments
4 min read
How Hackers Use Footprinting to Plan Their Attacks (And How to Stop Them)

How Hackers Use Footprinting to Plan Their Attacks (And How to Stop Them)

Comments
2 min read
OWASP Top 10: What Every Developer Should Know About It

OWASP Top 10: What Every Developer Should Know About It

Comments
9 min read
Why protect undersea cables?

Why protect undersea cables?

1
Comments
1 min read
The Future of Quantum Cyber Security

The Future of Quantum Cyber Security

1
Comments
8 min read
I Built an Nmap GUI Client Using Tkinter to Simplify Network Scanning for You

I Built an Nmap GUI Client Using Tkinter to Simplify Network Scanning for You

65
Comments
4 min read
Software Bill of Materials (SBOM) for your Spin Apps

Software Bill of Materials (SBOM) for your Spin Apps

Comments
9 min read
Silk Road: The Deadliest Market on the Dark Web

Silk Road: The Deadliest Market on the Dark Web

1
Comments
2 min read
Why is Information Systems (IS) Auditing Important?

Why is Information Systems (IS) Auditing Important?

Comments
2 min read
GDPR Compliance: A Must-Have for Every Business in the Digital Age

GDPR Compliance: A Must-Have for Every Business in the Digital Age

Comments
4 min read
Cyber Crime Gone Wrong: Man’s Dark Web Hitman Plot Exposed

Cyber Crime Gone Wrong: Man’s Dark Web Hitman Plot Exposed

Comments
2 min read
Importance of DevSecOps: Integrating Security into DevOps

Importance of DevSecOps: Integrating Security into DevOps

4
Comments
2 min read
Microsoft's Majorana 1: A Quantum Computing Breakthrough

Microsoft's Majorana 1: A Quantum Computing Breakthrough

Comments
3 min read
5 Reasons Startups Should Consider Using Locker.io for Secrets Management

5 Reasons Startups Should Consider Using Locker.io for Secrets Management

Comments
2 min read
loading...