DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Demystifying JWT: How to secure your next web app

Demystifying JWT: How to secure your next web app

632
Comments 16
7 min read
Please remove that .git folder

Please remove that .git folder

296
Comments 42
2 min read
Gaining remote access to a computer with a reverse shell attack in Node.js

Gaining remote access to a computer with a reverse shell attack in Node.js

286
Comments 11
9 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

182
Comments 12
4 min read
Authentication vs. Authorization

Authentication vs. Authorization

162
Comments 4
2 min read
Simple Commands in Linux That Will Make You Feel Like a Pro

Simple Commands in Linux That Will Make You Feel Like a Pro

161
Comments 1
4 min read
11 Security tips to protect your website

11 Security tips to protect your website

133
Comments 11
6 min read
Building Your Own VPN for Free

Building Your Own VPN for Free

127
Comments 28
3 min read
How healthcare organizations can take an agile approach towards cloud security controls?

How healthcare organizations can take an agile approach towards cloud security controls?

111
Comments 26
4 min read
Please remove that .DS_Store

Please remove that .DS_Store

99
Comments 18
2 min read
A Friendly Introduction to Cybersecurity

A Friendly Introduction to Cybersecurity

94
Comments
6 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

81
Comments
10 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

80
Comments 16
8 min read
Security tips for APIs & MongoDB

Security tips for APIs & MongoDB

67
Comments
2 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

64
Comments
4 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
What does 2022 have in store for cybersecurity and cloud security specialists?

What does 2022 have in store for cybersecurity and cloud security specialists?

57
Comments
7 min read
An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

An Introduction to Cybersecurity, Capture the Flag Contests, and Basic Security Concepts

57
Comments 1
7 min read
So you think your password is strong

So you think your password is strong

56
Comments 21
2 min read
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

52
Comments
14 min read
Understanding And Implementing Password Hashing In NodeJS.

Understanding And Implementing Password Hashing In NodeJS.

48
Comments 5
6 min read
I'm a nobody; why would anyone want to hack me?

I'm a nobody; why would anyone want to hack me?

48
Comments 2
8 min read
Forging GraphQL Bombs, the 2022 version of Zip Bombs

Forging GraphQL Bombs, the 2022 version of Zip Bombs

47
Comments 2
4 min read
5 API testing tools

5 API testing tools

46
Comments
4 min read
What Does Timing Attack Actually Mean?

What Does Timing Attack Actually Mean?

45
Comments 9
3 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

45
Comments 2
8 min read
Cyber Security: A run through.

Cyber Security: A run through.

44
Comments 6
6 min read
XSS: What it is, how it works, and how to prevent it

XSS: What it is, how it works, and how to prevent it

43
Comments 3
8 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

40
Comments
3 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

40
Comments
11 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

38
Comments 4
6 min read
The Things to Keep in Mind about Auth

The Things to Keep in Mind about Auth

36
Comments
8 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Introduction To Data Encryption With Python

Introduction To Data Encryption With Python

33
Comments 3
6 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Open source API Security testing tools

Open source API Security testing tools

31
Comments 1
2 min read
Tips to launch your career in cybersecurity

Tips to launch your career in cybersecurity

30
Comments 1
5 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
ENV vars and security

ENV vars and security

29
Comments
4 min read
Are You Saving The Passwords On Browsers?

Are You Saving The Passwords On Browsers?

29
Comments 12
3 min read
Cyber Security Introduction (part 3: Man in the Middle )

Cyber Security Introduction (part 3: Man in the Middle )

28
Comments
3 min read
Crap, we might have installed a malicious dependency...

Crap, we might have installed a malicious dependency...

28
Comments 4
3 min read
Introduction to Cybersecurity Tools & Cyber Attacks

Introduction to Cybersecurity Tools & Cyber Attacks

26
Comments 1
6 min read
How do you perform API testing?

How do you perform API testing?

26
Comments
2 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

25
Comments 7
2 min read
Thinking of a career in tech? Look to cybersecurity, first.

Thinking of a career in tech? Look to cybersecurity, first.

24
Comments 1
3 min read
Day-9: Bash Scripting - #1

Day-9: Bash Scripting - #1

24
Comments
2 min read
How my open source tool got 100 stars in 4 days!

How my open source tool got 100 stars in 4 days!

24
Comments 4
3 min read
8 Most Common Type Of Cyber Attacks

8 Most Common Type Of Cyber Attacks

24
Comments 2
3 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
When to use AWS Credentials

When to use AWS Credentials

23
Comments
5 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

23
Comments
10 min read
How are API security testing tools different from website security testing?

How are API security testing tools different from website security testing?

23
Comments
3 min read
What actually happens when you leak credentials on GitHub: The experiment

What actually happens when you leak credentials on GitHub: The experiment

23
Comments 5
5 min read
How an overlook in development wreaked havoc on the internet - The Log4Shell Vulnerability

How an overlook in development wreaked havoc on the internet - The Log4Shell Vulnerability

23
Comments 6
5 min read
My jounrey into API Security

My jounrey into API Security

23
Comments
2 min read
what is rainbow table ?

what is rainbow table ?

23
Comments 4
1 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

22
Comments
5 min read
Getting started with Penetration Testing!

Getting started with Penetration Testing!

22
Comments 1
4 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
loading...