DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Detecting changes in JavaScript and CSS isn't an easy task, Part 2

Detecting changes in JavaScript and CSS isn't an easy task, Part 2

5
Comments
4 min read
How to become a Bug Bounty Hunter

How to become a Bug Bounty Hunter

5
Comments
2 min read
Unlocking efficient authZ with Cerbos’ Query Plan

Unlocking efficient authZ with Cerbos’ Query Plan

2
Comments
5 min read
Navigating the Dark Corners of the Internet with a Beacon of Hope

Navigating the Dark Corners of the Internet with a Beacon of Hope

2
Comments
2 min read
Five open-source projects to secure access to your applications

Five open-source projects to secure access to your applications

1
Comments
5 min read
Detecting changes in JavaScript and CSS isn't an easy task, Part 1

Detecting changes in JavaScript and CSS isn't an easy task, Part 1

6
Comments
5 min read
Top 10 Snyk Alternatives for Code Security

Top 10 Snyk Alternatives for Code Security

1
Comments
8 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
Cybersecurity In The World Of Generative AI

Cybersecurity In The World Of Generative AI

1
Comments 2
2 min read
Why you need Interactive Application Security Testing (IAST) 🔒

Why you need Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Top 10 Password Hacking Tools for 2023

Top 10 Password Hacking Tools for 2023

8
Comments
11 min read
Stay Ahead of Threats with Penetration Testing Services

Stay Ahead of Threats with Penetration Testing Services

3
Comments
2 min read
Shadow API Adoption Skyrockets 900%! 🚀

Shadow API Adoption Skyrockets 900%! 🚀

15
Comments 3
2 min read
Researcher finds GitHub admin credentials of car company thanks to misconfiguration

Researcher finds GitHub admin credentials of car company thanks to misconfiguration

4
Comments
6 min read
CYBER SECURITY ONLINE TRAINING

CYBER SECURITY ONLINE TRAINING

1
Comments
3 min read
Single Sign-On (SSO): The Key to Secure and Convenient Modern Authentication

Single Sign-On (SSO): The Key to Secure and Convenient Modern Authentication

1
Comments
7 min read
Online Security - A Simple Guide

Online Security - A Simple Guide

Comments
4 min read
Wanna uncover sneaky APIs with us? đŸ±â€đŸ‘€ 👀

Wanna uncover sneaky APIs with us? đŸ±â€đŸ‘€ 👀

24
Comments
1 min read
Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Comments
10 min read
First negative user feedback

First negative user feedback

9
Comments
3 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
Networking for offensive security {0.1}

Networking for offensive security {0.1}

1
Comments
3 min read
Security tools and AI are a perfect match

Security tools and AI are a perfect match

5
Comments
4 min read
Secure database access from web apps

Secure database access from web apps

13
Comments
7 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

12
Comments
5 min read
[GameDev] Unity3D, C# and String Security

[GameDev] Unity3D, C# and String Security

6
Comments
14 min read
Using GitGuardian Honeytoken [cheat sheet included]

Using GitGuardian Honeytoken [cheat sheet included]

3
Comments
7 min read
Building Your Own VPN for Free

Building Your Own VPN for Free

122
Comments 25
3 min read
Keeping Data Secure in Cloudtech & DevOps

Keeping Data Secure in Cloudtech & DevOps

11
Comments
5 min read
Getting started with cybersecurity/ethical hacking

Getting started with cybersecurity/ethical hacking

13
Comments
6 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

18
Comments 3
7 min read
Critical Analysis: Unraveling the Apache RocketMQ Remote Code Execution Vulnerability (CVE-2023-33246)

Critical Analysis: Unraveling the Apache RocketMQ Remote Code Execution Vulnerability (CVE-2023-33246)

Comments
7 min read
Password strength detector with machine learning

Password strength detector with machine learning

1
Comments
2 min read
Navigating Security and Compliance

Navigating Security and Compliance

13
Comments 2
4 min read
7 Unique and Underrated Python Libraries

7 Unique and Underrated Python Libraries

10
Comments 6
4 min read
Best Practices for Cybersecurity in the Digital Age

Best Practices for Cybersecurity in the Digital Age

1
Comments 1
4 min read
Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

7
Comments
2 min read
Getting Started with Penetration Testing

Getting Started with Penetration Testing

1
Comments
3 min read
[Hack] PicoCTF: Warmed Up

[Hack] PicoCTF: Warmed Up

Comments
3 min read
Passkeys vs Passwords: The Future of Digital Authentication

Passkeys vs Passwords: The Future of Digital Authentication

Comments
3 min read
Deploy a Machine Learning Spam SMS Filter App In Minutes Using BentoML

Deploy a Machine Learning Spam SMS Filter App In Minutes Using BentoML

Comments
7 min read
Trouble in Paradise: Battling the Balada Injector

Trouble in Paradise: Battling the Balada Injector

4
Comments 1
3 min read
SSH Attackers VS Honeypots

SSH Attackers VS Honeypots

12
Comments
4 min read
HMAC & Message Authentication Codes - Why hashing alone is NOT ENOUGH for Data Integrity đŸ˜Œ

HMAC & Message Authentication Codes - Why hashing alone is NOT ENOUGH for Data Integrity đŸ˜Œ

4
Comments
5 min read
Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

1
Comments
3 min read
[Hack] CTF Challenge - VulnBegin Flags

[Hack] CTF Challenge - VulnBegin Flags

2
Comments
8 min read
Unveiling the Facts and Security Measures Of Chat GPT.

Unveiling the Facts and Security Measures Of Chat GPT.

1
Comments
3 min read
Vulnerability Scanning

Vulnerability Scanning

1
Comments
2 min read
5 Tech skills to make you high demand employee in 2023 đŸ”„đŸ€Ż

5 Tech skills to make you high demand employee in 2023 đŸ”„đŸ€Ż

6
Comments 3
3 min read
Hack The Box Writeup: Emdee Five for Life

Hack The Box Writeup: Emdee Five for Life

Comments
6 min read
Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears

Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears

1
Comments
13 min read
Talking about JSONP Hijacking Vulnerability

Talking about JSONP Hijacking Vulnerability

2
Comments
3 min read
Scraping Using Python in Step by step approach

Scraping Using Python in Step by step approach

18
Comments
17 min read
Information Gathering

Information Gathering

2
Comments
2 min read
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis

Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis

Comments
5 min read
What is a Man-in-the-Middle (MITM) Attack?

What is a Man-in-the-Middle (MITM) Attack?

Comments
2 min read
How to use CSPM to help your organization against Ransomware attacks targeting data on Amazon S3?

How to use CSPM to help your organization against Ransomware attacks targeting data on Amazon S3?

3
Comments
5 min read
Why Google Zanzibar Shines at Building Authorization

Why Google Zanzibar Shines at Building Authorization

16
Comments
7 min read
Secure Your Firebase: Database Rules and Client Authentication

Secure Your Firebase: Database Rules and Client Authentication

Comments
2 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
loading...