DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
O arco-íris da cybersegurança

O arco-íris da cybersegurança

182
Comments 12
4 min read
Building Your Own VPN for Free

Building Your Own VPN for Free

127
Comments 28
3 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

81
Comments 16
8 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
Making Life More Difficult for Bank Scammers

Making Life More Difficult for Bank Scammers

38
Comments 4
6 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
How my open source tool got 100 stars in 4 days!

How my open source tool got 100 stars in 4 days!

31
Comments 4
3 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Becoming a Cyber Security Advocate: Importance of Role Models

Becoming a Cyber Security Advocate: Importance of Role Models

25
Comments 7
2 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Beyond Basics: Traversing Kali Linux Tools

Beyond Basics: Traversing Kali Linux Tools

21
Comments
5 min read
Exploring Steganography in the Wild - Part 1

Exploring Steganography in the Wild - Part 1

20
Comments 8
20 min read
Wanna uncover sneaky APIs with us? 🐱‍👤 👀

Wanna uncover sneaky APIs with us? 🐱‍👤 👀

20
Comments
1 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

20
Comments
6 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

18
Comments 3
7 min read
Scraping Using Python in Step by step approach

Scraping Using Python in Step by step approach

18
Comments
17 min read
Why Google Zanzibar Shines at Building Authorization

Why Google Zanzibar Shines at Building Authorization

16
Comments
7 min read
Subnetting

Subnetting

15
Comments 3
3 min read
Shadow API Adoption Skyrockets 900%! 🚀

Shadow API Adoption Skyrockets 900%! 🚀

15
Comments 3
2 min read
Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

Tracking Snoop Dogg's $4M Crypto Wallet with My New Open Source Tool!

15
Comments
1 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
Top 10 Hackers

Top 10 Hackers

12
Comments 11
9 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

12
Comments
6 min read
WebSecurity e a sua importância

WebSecurity e a sua importância

12
Comments 1
5 min read
Navigating Security and Compliance

Navigating Security and Compliance

12
Comments 2
4 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

12
Comments
9 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
Building a Go Package with Melange and a Docker Image with Apko

Building a Go Package with Melange and a Docker Image with Apko

11
Comments
4 min read
Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

11
Comments
8 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

10
Comments 3
12 min read
Exploit Development: Buffer Overflows

Exploit Development: Buffer Overflows

10
Comments
3 min read
The best application security tool is education

The best application security tool is education

10
Comments
4 min read
[PT-BR] Desmontagem e o IDA Pro na Análise de Programas

[PT-BR] Desmontagem e o IDA Pro na Análise de Programas

10
Comments
8 min read
Navigating the Cyber Battlefield: Unmasking Various Types of Online Threats 🤖

Navigating the Cyber Battlefield: Unmasking Various Types of Online Threats 🤖

10
Comments
5 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
7 Unique and Underrated Python Libraries

7 Unique and Underrated Python Libraries

9
Comments 6
4 min read
Scanning ports and finding network vulnerabilities using nmap

Scanning ports and finding network vulnerabilities using nmap

9
Comments
7 min read
Samsung Passkey Updates: What’s New?

Samsung Passkey Updates: What’s New?

9
Comments
2 min read
What is Forward Proxy and Reverse Proxy

What is Forward Proxy and Reverse Proxy

9
Comments
2 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

9
Comments
6 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts

9
Comments
4 min read
📜 RepoList - A tool to generate wordlists based on GitHub repositories

📜 RepoList - A tool to generate wordlists based on GitHub repositories

8
Comments 1
3 min read
Explore web applications through their content security policy (CSP)

Explore web applications through their content security policy (CSP)

8
Comments
5 min read
Enhancing Cybersecurity with Ruby: A Comprehensive Guide

Enhancing Cybersecurity with Ruby: A Comprehensive Guide

8
Comments
3 min read
What Is A Hash?

What Is A Hash?

8
Comments
12 min read
DLLs in Rust🦀

DLLs in Rust🦀

8
Comments
4 min read
Introduction to OWASP

Introduction to OWASP

8
Comments
2 min read
Top Tools for CyberSecurity in 2023

Top Tools for CyberSecurity in 2023

8
Comments
5 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
The Dark side of Rust programming language

The Dark side of Rust programming language

8
Comments 2
4 min read
PyPI Repository Under Attack: New Users and Package Uploads Temporarily Stopped

PyPI Repository Under Attack: New Users and Package Uploads Temporarily Stopped

8
Comments
2 min read
Getting started with cybersecurity/ethical hacking

Getting started with cybersecurity/ethical hacking

7
Comments
6 min read
🔒🌐 Cybersecurity in the Digital Age 🌐🔒

🔒🌐 Cybersecurity in the Digital Age 🌐🔒

7
Comments
6 min read
Keeping Data Secure in Cloudtech & DevOps

Keeping Data Secure in Cloudtech & DevOps

7
Comments
5 min read
Detecting changes in JavaScript and CSS isn't an easy task, Part 3

Detecting changes in JavaScript and CSS isn't an easy task, Part 3

7
Comments
5 min read
A tiny fix with big impact and high risk

A tiny fix with big impact and high risk

7
Comments 6
4 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
loading...