DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SARIF, And More…

Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SARIF, And More…

3
Comments
8 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
Cybersecurity Awareness Month: Stay Safe Online

Cybersecurity Awareness Month: Stay Safe Online

Comments
3 min read
Security is Usability — Examining Cybersecurity Erosion

Security is Usability — Examining Cybersecurity Erosion

Comments
8 min read
Another Blog Drop: Let's Dive Deep into C# Code Review with EasySharp by TryCrack.me ...... ⚡️📷

Another Blog Drop: Let's Dive Deep into C# Code Review with EasySharp by TryCrack.me ...... ⚡️📷

Comments
1 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Comments
2 min read
Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Comments
1 min read
How to Activate Microsoft Passkeys on Windows

How to Activate Microsoft Passkeys on Windows

Comments
3 min read
Cybersecurity 101: Securing Your Personal Data Like a Pro

Cybersecurity 101: Securing Your Personal Data Like a Pro

1
Comments
5 min read
Walkthrough / Solution to SBT's Wireshark Challenge Activity

Walkthrough / Solution to SBT's Wireshark Challenge Activity

Comments
6 min read
Jenkins File Read Vulnerability - CVE-2024-23897

Jenkins File Read Vulnerability - CVE-2024-23897

2
Comments
2 min read
What is the Principle of Least Privilege?

What is the Principle of Least Privilege?

Comments
2 min read
Data Protection in the Digital Age

Data Protection in the Digital Age

Comments
6 min read
Top 5 Cybersecurity Certifications to Boost Your Career

Top 5 Cybersecurity Certifications to Boost Your Career

5
Comments
2 min read
Scrambled EXIF: Remove Metadata From Your Media In A Blink!

Scrambled EXIF: Remove Metadata From Your Media In A Blink!

7
Comments
3 min read
Build Your First Port Scanner using Python in 2024

Build Your First Port Scanner using Python in 2024

11
Comments 2
5 min read
A Complete Guide to Social Engineering Attacks.

A Complete Guide to Social Engineering Attacks.

6
Comments
4 min read
Opening Pandora's Container - Gaining Host Access (Part 2)

Opening Pandora's Container - Gaining Host Access (Part 2)

Comments
8 min read
Demystifying XDR for MSPs: A Practical Guide

Demystifying XDR for MSPs: A Practical Guide

Comments
4 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Comments
2 min read
Tackling Cybersecurity Threats in educational institutions is indeed challenging but crucial

Tackling Cybersecurity Threats in educational institutions is indeed challenging but crucial

Comments
1 min read
Is it possible to eliminate phishing?

Is it possible to eliminate phishing?

Comments
1 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Comments
2 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

Comments
15 min read
# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero

# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero

Comments
5 min read
Threat Modeling with STRIDE - ultra-simplified !!

Threat Modeling with STRIDE - ultra-simplified !!

Comments
4 min read
Update / Delete Passkeys via WebAuthn Signal API

Update / Delete Passkeys via WebAuthn Signal API

Comments
3 min read
Ensure a robust and secure environment

Ensure a robust and secure environment

Comments
2 min read
10 GCP Security Best Practices for Busy DevOps

10 GCP Security Best Practices for Busy DevOps

Comments
7 min read
How Semantic Analysis Works in SafeLine WAF

How Semantic Analysis Works in SafeLine WAF

8
Comments
2 min read
Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!

Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!

Comments
3 min read
Where Should I Start with Cybersecurity

Where Should I Start with Cybersecurity

3
Comments
5 min read
Load Balancing with Reverse Proxy

Load Balancing with Reverse Proxy

3
Comments
3 min read
SafeLine WAF : Best Anti-Bot Tool Ever

SafeLine WAF : Best Anti-Bot Tool Ever

2
Comments
2 min read
Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Comments
2 min read
Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

5
Comments
2 min read
How to Set Up SSL Protocols and Cipher Suites with SafeLine WAF

How to Set Up SSL Protocols and Cipher Suites with SafeLine WAF

5
Comments
2 min read
Guide to SafeLine Open API: Secure Your Access with API Tokens

Guide to SafeLine Open API: Secure Your Access with API Tokens

5
Comments
2 min read
Do You Have a Website? Are You Worried About Hackers Attacking It?

Do You Have a Website? Are You Worried About Hackers Attacking It?

6
Comments
3 min read
Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

6
Comments
4 min read
Deploying Static Files for Website Hosting in SafeLine

Deploying Static Files for Website Hosting in SafeLine

5
Comments
1 min read
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"

DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"

Comments
1 min read
Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

1
Comments
4 min read
Why Cyber Security Testing is Essential for Compliance and Regulation

Why Cyber Security Testing is Essential for Compliance and Regulation

1
Comments 1
5 min read
Integrating Cybersecurity into Risk Management: A Comprehensive Guide

Integrating Cybersecurity into Risk Management: A Comprehensive Guide

Comments
6 min read
Every Cyber Attack and how to prevent from them

Every Cyber Attack and how to prevent from them

6
Comments
5 min read
Drupal GovCon 2024: Securing The Government's Open-Source Web Applications

Drupal GovCon 2024: Securing The Government's Open-Source Web Applications

Comments
6 min read
The Intersection of Cybersecurity and Artificial Intelligence: A New Frontier

The Intersection of Cybersecurity and Artificial Intelligence: A New Frontier

Comments
4 min read
You do not know, what you do not know.

You do not know, what you do not know.

Comments
2 min read
How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

6
Comments
3 min read
The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

3
Comments
4 min read
What is a Web Application Gateway

What is a Web Application Gateway

11
Comments
2 min read
Guide: How to Add Passkeys to Enterprise Systems

Guide: How to Add Passkeys to Enterprise Systems

1
Comments
3 min read
Practical Example of Escaping XSS Context

Practical Example of Escaping XSS Context

4
Comments 1
4 min read
loading...