DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is a Man-in-the-Middle (MITM) Attack?

What is a Man-in-the-Middle (MITM) Attack?

Comments
2 min read
How to use CSPM to help your organization against Ransomware attacks targeting data on Amazon S3?

How to use CSPM to help your organization against Ransomware attacks targeting data on Amazon S3?

3
Comments
5 min read
Why Google Zanzibar Shines at Building Authorization

Why Google Zanzibar Shines at Building Authorization

16
Comments
7 min read
Automated Versus Dynamic Remediation: Risks and Rewards

Automated Versus Dynamic Remediation: Risks and Rewards

1
Comments
4 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

183
Comments 12
4 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears

Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears

1
Comments
13 min read
Defenders Unleashed: Vital Tools for Ethical Hacking

Defenders Unleashed: Vital Tools for Ethical Hacking

6
Comments
3 min read
LangChain Arbitrary Command Execution - CVE-2023-34541

LangChain Arbitrary Command Execution - CVE-2023-34541

1
Comments
2 min read
What is Cyber Bullying?

What is Cyber Bullying?

Comments 1
3 min read
Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

1
Comments
3 min read
Why Metasploit ?!

Why Metasploit ?!

5
Comments
2 min read
Passwordless Authentication: The Key to Preventing Credential Stuffing

Passwordless Authentication: The Key to Preventing Credential Stuffing

Comments
4 min read
php[tek] 2023 - A Community Of Communities Powering The Internet

php[tek] 2023 - A Community Of Communities Powering The Internet

2
Comments
9 min read
Overview of Pentesting Phases

Overview of Pentesting Phases

4
Comments
2 min read
Information Gathering

Information Gathering

2
Comments
2 min read
Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Comments
3 min read
AI and Cyber Security

AI and Cyber Security

6
Comments
3 min read
Attack Path Analysis: What It Is and Why You Should Care

Attack Path Analysis: What It Is and Why You Should Care

2
Comments
5 min read
Are Your Company Secrets Safe on GitHub? Here's Why You Need to Request a Complimentary Audit

Are Your Company Secrets Safe on GitHub? Here's Why You Need to Request a Complimentary Audit

Comments
5 min read
Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Comments
3 min read
AWS and Cyber Insurance

AWS and Cyber Insurance

2
Comments
2 min read
Harnessing the Dual LLM Pattern for Prompt Security with MindsDB

Harnessing the Dual LLM Pattern for Prompt Security with MindsDB

Comments
5 min read
Transforming Azure Static Web Applications into C2 Redirectors

Transforming Azure Static Web Applications into C2 Redirectors

Comments
4 min read
XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

Comments
9 min read
Shared Security Architecture for Cloud

Shared Security Architecture for Cloud

1
Comments
6 min read
Flutter KeyStorage discussion

Flutter KeyStorage discussion

7
Comments
1 min read
Secure Your Firebase: Database Rules and Client Authentication

Secure Your Firebase: Database Rules and Client Authentication

Comments
2 min read
Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

4
Comments
6 min read
Enhancing Data Security: Unveiling IMDSv2's Shield Against Vulnerabilities in IMDSv1

Enhancing Data Security: Unveiling IMDSv2's Shield Against Vulnerabilities in IMDSv1

1
Comments
4 min read
101: Database Backup Security

101: Database Backup Security

Comments
3 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

12
Comments
6 min read
Key Hacks for Testers: Unleashing the Power of the Network Tab in Your Browser

Key Hacks for Testers: Unleashing the Power of the Network Tab in Your Browser

Comments
4 min read
Splunk: Building a Secure Monitoring Solution (Part 1)

Splunk: Building a Secure Monitoring Solution (Part 1)

2
Comments 1
6 min read
How I built an automated vulnerability scanner SECaaS

How I built an automated vulnerability scanner SECaaS

1
Comments 2
3 min read
Top Tools for CyberSecurity in 2023

Top Tools for CyberSecurity in 2023

8
Comments
5 min read
Designing software architecture for security

Designing software architecture for security

Comments
9 min read
What is Provisioning and how does it work?

What is Provisioning and how does it work?

3
Comments
2 min read
5 Fun Side Hustles for Cybersecurity Students

5 Fun Side Hustles for Cybersecurity Students

Comments
3 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
The Dark side of Rust programming language

The Dark side of Rust programming language

8
Comments 2
4 min read
Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

2
Comments
5 min read
Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

6
Comments
3 min read
what is Zero Trust?

what is Zero Trust?

2
Comments
2 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

12
Comments
9 min read
The Ultimate Guide to Web Application Security (As a developer)

The Ultimate Guide to Web Application Security (As a developer)

Comments
4 min read
How to Setup Semgrep Rules for Optimal SAST Scanning

How to Setup Semgrep Rules for Optimal SAST Scanning

Comments
7 min read
Password Hashing 101: All About Password Hashing and How it Works

Password Hashing 101: All About Password Hashing and How it Works

Comments
10 min read
PyPI Repository Under Attack: New Users and Package Uploads Temporarily Stopped

PyPI Repository Under Attack: New Users and Package Uploads Temporarily Stopped

8
Comments
2 min read
How to Comply with GDPR in AWS

How to Comply with GDPR in AWS

Comments
2 min read
GitHub Security Best Practices – 15 Tips To Keep In Mind

GitHub Security Best Practices – 15 Tips To Keep In Mind

5
Comments
11 min read
Debug mTLS HTTPS connections using Wireshark

Debug mTLS HTTPS connections using Wireshark

2
Comments
5 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Advanced Wireshark Scripts for Intrusion Detection

Advanced Wireshark Scripts for Intrusion Detection

Comments
4 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

9
Comments
6 min read
Simple Wireshark Scripts for Easy Network Forensics

Simple Wireshark Scripts for Easy Network Forensics

5
Comments
3 min read
Types of Privilege Escalation Attacks

Types of Privilege Escalation Attacks

Comments
3 min read
The Impressive Evolution of Ransomware Code

The Impressive Evolution of Ransomware Code

2
Comments 1
10 min read
Improve Nmap Performance with These Brilliant Scripts

Improve Nmap Performance with These Brilliant Scripts

5
Comments
4 min read
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

9
Comments
4 min read
loading...