DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Análisis dinámico de aplicaciones web con OWASP ZAP

Análisis dinámico de aplicaciones web con OWASP ZAP

1
Comments 2
9 min read
Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

Protecting Exposed APIs: Avoid Data Leaks with SlashID Gate and OPA

2
Comments
11 min read
Software Testing in Rust for Developers

Software Testing in Rust for Developers

Comments 2
8 min read
A Beginner's Guide to Bug Bounty Programs

A Beginner's Guide to Bug Bounty Programs

Comments
2 min read
Learning Hacking: A Comprehensive Guide

Learning Hacking: A Comprehensive Guide

Comments
2 min read
10 IAM Best Practices For 2023

10 IAM Best Practices For 2023

Comments
7 min read
Stay Ahead of Threats with Penetration Testing Services

Stay Ahead of Threats with Penetration Testing Services

3
Comments
2 min read
Synthetic Monitoring Metrics: What are the Key Performance Insights?

Synthetic Monitoring Metrics: What are the Key Performance Insights?

Comments
6 min read
A plan for Q3 2023 iteration

A plan for Q3 2023 iteration

6
Comments
3 min read
A tiny fix with big impact and high risk

A tiny fix with big impact and high risk

7
Comments 6
4 min read
🦠 Malware Demystified: Navigating the Digital Threat Landscape

🦠 Malware Demystified: Navigating the Digital Threat Landscape

6
Comments 1
3 min read
What is Linux and Why Do Hackers Use It?

What is Linux and Why Do Hackers Use It?

2
Comments 2
3 min read
📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

5
Comments 2
4 min read
CYBER SECURITY ONLINE TRAINING

CYBER SECURITY ONLINE TRAINING

1
Comments
3 min read
Unveiling the Art of Ethical Hacking: Understanding the Five Phases

Unveiling the Art of Ethical Hacking: Understanding the Five Phases

4
Comments
3 min read
Online Security - A Simple Guide

Online Security - A Simple Guide

Comments
4 min read
How to identify IoT devices with machine learning

How to identify IoT devices with machine learning

3
Comments
10 min read
Mastering Nmap: A Comprehensive Guide

Mastering Nmap: A Comprehensive Guide

4
Comments
4 min read
Announcing Secutils.dev 1.0.0-alpha.2 release

Announcing Secutils.dev 1.0.0-alpha.2 release

5
Comments
3 min read
Demystifying DFIR: Understanding the Basics of Digital Forensics and Incident Response

Demystifying DFIR: Understanding the Basics of Digital Forensics and Incident Response

4
Comments
3 min read
Exploring Steganography in the Wild - Part 1

Exploring Steganography in the Wild - Part 1

20
Comments 8
20 min read
Networking for offensive security {0.1}

Networking for offensive security {0.1}

1
Comments
3 min read
How is it to build something in public?

How is it to build something in public?

5
Comments
2 min read
Identificando vulnerabilidades en código fuente a través de análisis estático con SonarQube

Identificando vulnerabilidades en código fuente a través de análisis estático con SonarQube

1
Comments
9 min read
Detecting changes in JavaScript and CSS isn't an easy task, Part 3

Detecting changes in JavaScript and CSS isn't an easy task, Part 3

7
Comments
5 min read
Detecting changes in JavaScript and CSS isn't an easy task, Part 2

Detecting changes in JavaScript and CSS isn't an easy task, Part 2

5
Comments
4 min read
Hardcoded secret at the heart of the Dell Compellent VMware vulnerability

Hardcoded secret at the heart of the Dell Compellent VMware vulnerability

1
Comments
6 min read
Shadow API Adoption Skyrockets 900%! 🚀

Shadow API Adoption Skyrockets 900%! 🚀

15
Comments 3
2 min read
Building Your Own VPN for Free

Building Your Own VPN for Free

127
Comments 28
3 min read
Detecting changes in JavaScript and CSS isn't an easy task, Part 1

Detecting changes in JavaScript and CSS isn't an easy task, Part 1

6
Comments
5 min read
Researcher finds GitHub admin credentials of car company thanks to misconfiguration

Researcher finds GitHub admin credentials of car company thanks to misconfiguration

1
Comments
6 min read
How to become a Bug Bounty Hunter

How to become a Bug Bounty Hunter

5
Comments
2 min read
Unlocking efficient authZ with Cerbos’ Query Plan

Unlocking efficient authZ with Cerbos’ Query Plan

2
Comments
5 min read
Navigating the Dark Corners of the Internet with a Beacon of Hope

Navigating the Dark Corners of the Internet with a Beacon of Hope

2
Comments
2 min read
Wanna uncover sneaky APIs with us? 🐱‍👤 👀

Wanna uncover sneaky APIs with us? 🐱‍👤 👀

20
Comments
1 min read
Five open-source projects to secure access to your applications

Five open-source projects to secure access to your applications

2
Comments
5 min read
First negative user feedback

First negative user feedback

7
Comments
3 min read
Using GitGuardian Honeytoken [cheat sheet included]

Using GitGuardian Honeytoken [cheat sheet included]

3
Comments
7 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
Top 10 Password Hacking Tools for 2023

Top 10 Password Hacking Tools for 2023

5
Comments
11 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

18
Comments 3
7 min read
Security tools and AI are a perfect match

Security tools and AI are a perfect match

5
Comments
4 min read
Interesting Software Vulns

Interesting Software Vulns

Comments
3 min read
Top 10 Snyk Alternatives for Code Security

Top 10 Snyk Alternatives for Code Security

1
Comments
8 min read
CloudDefense.AI helped secure a database that contained entries of over 153,000 users

CloudDefense.AI helped secure a database that contained entries of over 153,000 users

Comments
2 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
Password strength detector with machine learning

Password strength detector with machine learning

2
Comments
2 min read
Light Sabers Unleashed: The Lazy Developer's Guide to Outsmarting Botnets

Light Sabers Unleashed: The Lazy Developer's Guide to Outsmarting Botnets

Comments
3 min read
Navigating Security and Compliance

Navigating Security and Compliance

12
Comments 2
4 min read
AI in Malware Development: Unveiling the Darker Side of Technology

AI in Malware Development: Unveiling the Darker Side of Technology

Comments
2 min read
How to Install and Configure Kerberos on Windows 10

How to Install and Configure Kerberos on Windows 10

Comments
2 min read
7 Unique and Underrated Python Libraries

7 Unique and Underrated Python Libraries

9
Comments 6
4 min read
Best Practices for Cybersecurity in the Digital Age

Best Practices for Cybersecurity in the Digital Age

1
Comments 1
4 min read
NIST Cybersecurity Framework for Cybersecurity Beginners

NIST Cybersecurity Framework for Cybersecurity Beginners

2
Comments
6 min read
Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

7
Comments 1
2 min read
The Use of Biometrics as a Cybersecurity Method

The Use of Biometrics as a Cybersecurity Method

5
Comments
8 min read
Getting started with cybersecurity/ethical hacking

Getting started with cybersecurity/ethical hacking

7
Comments
6 min read
Getting Started with Penetration Testing

Getting Started with Penetration Testing

1
Comments
3 min read
[Hack] PicoCTF: Warmed Up

[Hack] PicoCTF: Warmed Up

Comments
3 min read
Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Comments
10 min read
loading...