DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

20
Comments
6 min read
Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

15
Comments
1 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

9
Comments
3 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

7
Comments
16 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
Command Injection (Course Content)

Command Injection (Course Content)

5
Comments
3 min read
Create a customized identity verification pipeline

Create a customized identity verification pipeline

5
Comments
1 min read
Host your own CTF for free đź’¸ (CTFd Setup Guide)

Host your own CTF for free đź’¸ (CTFd Setup Guide)

5
Comments
3 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Explore the Avenues of Building a Career in Cyber Security

Explore the Avenues of Building a Career in Cyber Security

3
Comments
3 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Explained: Gesturejacking and Clickjacking

Explained: Gesturejacking and Clickjacking

2
Comments
3 min read
Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

Mastering White Hat Hacking Without a Single Line of Code: A Non-Traditional Hacker's Journey

2
Comments
2 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
AWS GuardDuty for ATP (Advanced Threat Detection)

AWS GuardDuty for ATP (Advanced Threat Detection)

2
Comments
2 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

1
Comments
6 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
7 Essential SaaS Security Best Practices

7 Essential SaaS Security Best Practices

1
Comments
7 min read
Types of firewalls and Best Practices in Cybersecurity

Types of firewalls and Best Practices in Cybersecurity

1
Comments 1
3 min read
Is 2-Step-Verification (2SV) or 2-Factor-Authentication (2FA) Better?

Is 2-Step-Verification (2SV) or 2-Factor-Authentication (2FA) Better?

1
Comments
2 min read
Passkeys in web3: Passkeys @ Binance

Passkeys in web3: Passkeys @ Binance

1
Comments
2 min read
Tutorial: Add Passkeys to a Remix App

Tutorial: Add Passkeys to a Remix App

1
Comments
2 min read
TryHackMe- Compiled

TryHackMe- Compiled

1
Comments
2 min read
Advanced Analytics and Monitoring in Cyber Threat Detection

Advanced Analytics and Monitoring in Cyber Threat Detection

1
Comments
2 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
Yet another reason why the xz backdoor is a sneaky b@$tard

Yet another reason why the xz backdoor is a sneaky b@$tard

1
Comments
5 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

1
Comments
6 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 1
6 min read
[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

[Solved] Cross-Site Request Forgery (CSRF) Attacks with Spring Security.

1
Comments 2
4 min read
PicoCTF 2024: packer

PicoCTF 2024: packer

1
Comments 2
2 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

1
Comments
3 min read
Wazuh-Audit Kubernetes Cluster [RKE2]

Wazuh-Audit Kubernetes Cluster [RKE2]

1
Comments
5 min read
Serverless Security Best Practices

Serverless Security Best Practices

1
Comments
9 min read
What are Synced Passkeys?

What are Synced Passkeys?

1
Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
Future Scope of Cybersecurity in 2024

Future Scope of Cybersecurity in 2024

Comments
3 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
Information Disclosure

Information Disclosure

Comments
5 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
Level Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We Face

Level Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We Face

Comments
2 min read
What is Internet Control Message Protocol (ICMP)?

What is Internet Control Message Protocol (ICMP)?

Comments
3 min read
The Essential NAS (Network-Attached Storage) Data Protection Manual: Effective Backup Techniques

The Essential NAS (Network-Attached Storage) Data Protection Manual: Effective Backup Techniques

Comments
3 min read
How to Assess the Cybersecurity of Your Business?

How to Assess the Cybersecurity of Your Business?

Comments
3 min read
SQL Injection - Course Content

SQL Injection - Course Content

Comments
4 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
Loop DOS? LetĹ› Discuss.

Loop DOS? LetĹ› Discuss.

Comments
2 min read
Penetration Testion, A Guide.

Penetration Testion, A Guide.

Comments
2 min read
Adopt AI, But Responsibly!

Adopt AI, But Responsibly!

Comments
10 min read
Cybersecurity in Centralized Vs. Decentralized Computing

Cybersecurity in Centralized Vs. Decentralized Computing

Comments
4 min read
Curso CCNAv7 Gratuito NIC.br e CISCO: Enterprise Networking, Security, and Automation

Curso CCNAv7 Gratuito NIC.br e CISCO: Enterprise Networking, Security, and Automation

Comments
6 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
loading...