DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
A web security story from 2008: silently securing JSON.parse

A web security story from 2008: silently securing JSON.parse

7
Comments 1
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Understanding the nature of XSS

Understanding the nature of XSS

Comments
6 min read
How to Get Started with Bug Bounty?

How to Get Started with Bug Bounty?

3
Comments
6 min read
What is SAML and how SAML authentication works?

What is SAML and how SAML authentication works?

2
Comments
9 min read
Coding a Port Scanner with Python

Coding a Port Scanner with Python

7
Comments
3 min read
Best Practices for Building a Comprehensive Enterprise Data Security Strategy

Best Practices for Building a Comprehensive Enterprise Data Security Strategy

7
Comments
10 min read
SPF, DKIM and DMARC

SPF, DKIM and DMARC

1
Comments
3 min read
The (non-secure) MD5 Hash Algorithm

The (non-secure) MD5 Hash Algorithm

2
Comments
5 min read
How to use Burp Suite through a socks5 proxy with proxychains and chisel

How to use Burp Suite through a socks5 proxy with proxychains and chisel

29
Comments 1
4 min read
Hack The Box Writeup: Shoppy

Hack The Box Writeup: Shoppy

1
Comments
22 min read
Symfony Station Communiqué — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 24 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

3
Comments
10 min read
10 Essential Steps for Web Application Security Testing

10 Essential Steps for Web Application Security Testing

1
Comments
8 min read
The Importance of Security Operations Center (SOC)

The Importance of Security Operations Center (SOC)

5
Comments
8 min read
Converting string to enum at the cost of 50 GB: CVE-2020-36620

Converting string to enum at the cost of 50 GB: CVE-2020-36620

14
Comments 6
6 min read
Comparing Confidential Computing Alternatives in the Cloud

Comparing Confidential Computing Alternatives in the Cloud

5
Comments 3
4 min read
Symfony Station Communiqué — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

Symfony Station Communiqué — 17 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news!

4
Comments
11 min read
What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

3
Comments
6 min read
CIEM vs. CSPM: What is it and Which do I Need?

CIEM vs. CSPM: What is it and Which do I Need?

1
Comments
6 min read
Start your Career in Cyber Security

Start your Career in Cyber Security

4
Comments
2 min read
Introdução ao Linux: comandos básicos do terminal

Introdução ao Linux: comandos básicos do terminal

1
Comments
3 min read
Train Url prediction

Train Url prediction

2
Comments
4 min read
Symfony Station Communiqué — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

Symfony Station Communiqué — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

3
Comments
12 min read
Part 2: Useful OSINT Tools

Part 2: Useful OSINT Tools

1
Comments
2 min read
loading...