DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Stop Phishing by Analyzing the Bait

Stop Phishing by Analyzing the Bait

Comments
6 min read
Tutorial and User Experience on Activating Dynamic Protection in Safeline WAF

Tutorial and User Experience on Activating Dynamic Protection in Safeline WAF

1
Comments
2 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Salting & Hashing🍳

Salting & Hashing🍳

Comments
1 min read
Cybersecurity: The Importance of The Human Element

Cybersecurity: The Importance of The Human Element

Comments
12 min read
Securing Your Website: A Comprehensive Guide for Developers and Clients

Securing Your Website: A Comprehensive Guide for Developers and Clients

1
Comments
3 min read
What Every Cyber Specialist Needs to Know About Computer Structure

What Every Cyber Specialist Needs to Know About Computer Structure

1
Comments
2 min read
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals

Comments
2 min read
From Privacy Pioneers to Digital Guardians: Tracing the Evolution of Privacy Regulations

From Privacy Pioneers to Digital Guardians: Tracing the Evolution of Privacy Regulations

Comments
2 min read
Essential Frameworks, Standards, and Programs for Building a Robust Information Security Plan

Essential Frameworks, Standards, and Programs for Building a Robust Information Security Plan

1
Comments
3 min read
Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity

Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity

Comments
2 min read
Understanding the Distinction Between Information Security and Cybersecurity

Understanding the Distinction Between Information Security and Cybersecurity

Comments
2 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
VerifyVault v0.4 has been RELEASED! 🚀

VerifyVault v0.4 has been RELEASED! 🚀

Comments
1 min read
Unlocking the Power of Encryption: Safeguard Your Digital World Today

Unlocking the Power of Encryption: Safeguard Your Digital World Today

Comments 1
2 min read
Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

1
Comments 1
7 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
Understanding Advanced Persistent Threats (APTs)

Understanding Advanced Persistent Threats (APTs)

2
Comments
3 min read
How Infrastructure Monitoring Can Prevent a Cyber Attack

How Infrastructure Monitoring Can Prevent a Cyber Attack

1
Comments
4 min read
Hack The Box Writeup: Heist

Hack The Box Writeup: Heist

Comments
13 min read
Secure Access to Connected Devices

Secure Access to Connected Devices

Comments
2 min read
Sage Hosting vs On-Premises: A Data-Driven Analysis

Sage Hosting vs On-Premises: A Data-Driven Analysis

Comments
4 min read
Battle of the Shields: Unveiling the Best Two-Factor Authentication Method!

Battle of the Shields: Unveiling the Best Two-Factor Authentication Method!

Comments
2 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

1
Comments
1 min read
I lost $93 while testing the newly released Open AI vision

I lost $93 while testing the newly released Open AI vision

Comments
3 min read
Gone in 120 seconds

Gone in 120 seconds

Comments
5 min read
Comprehensive Guide to Vulnerability Assessment: Part 1

Comprehensive Guide to Vulnerability Assessment: Part 1

Comments
3 min read
Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
Unveiling the Truth: Debunking Myths and Misconceptions about 2FA

Unveiling the Truth: Debunking Myths and Misconceptions about 2FA

1
Comments
2 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

2
Comments
2 min read
Confusion vs Diffusion in cryptography

Confusion vs Diffusion in cryptography

Comments
1 min read
Unveiling the Shield: Ensuring Security with Open Source 2FA

Unveiling the Shield: Ensuring Security with Open Source 2FA

Comments
2 min read
Don't Be a Victim: The Ultimate Guide to Defending Against Cybersecurity Threats

Don't Be a Victim: The Ultimate Guide to Defending Against Cybersecurity Threats

Comments
2 min read
Secure Application Software Development

Secure Application Software Development

Comments
3 min read
🛡️ Key cybersecurity threats in 2024: What should businesses know?

🛡️ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure

The Ultimate Guide to Building a Secure Cloud Infrastructure

Comments
3 min read
Protect Your Digital World: Why You Need 2FA Now More Than Ever

Protect Your Digital World: Why You Need 2FA Now More Than Ever

Comments
2 min read
EDR vs. XDR vs. SIEM vs. MDR vs. SOAR

EDR vs. XDR vs. SIEM vs. MDR vs. SOAR

Comments
2 min read
Storing Passwords Securely - A Journey from Plain Text to Secure Password Storage

Storing Passwords Securely - A Journey from Plain Text to Secure Password Storage

1
Comments
8 min read
Why B2C Auth is Fundamentally Broken

Why B2C Auth is Fundamentally Broken

Comments
2 min read
What Googlers can teach you about Security part 2

What Googlers can teach you about Security part 2

1
Comments
6 min read
How a “Skeleton Key” Could Crack Open Your AI’s Secrets

How a “Skeleton Key” Could Crack Open Your AI’s Secrets

Comments
2 min read
Worldwide Cybersecurity market summary Q1 2024

Worldwide Cybersecurity market summary Q1 2024

3
Comments 1
2 min read
CORS: The Gatekeeper of Web Interactions

CORS: The Gatekeeper of Web Interactions

Comments
3 min read
The JavaScript Labyrinth: Unseen Dangers and Hidden Truths

The JavaScript Labyrinth: Unseen Dangers and Hidden Truths

1
Comments
3 min read
Guard Your Digital Fortress: Essential Privacy Best Practices Revealed

Guard Your Digital Fortress: Essential Privacy Best Practices Revealed

Comments
2 min read
AI in Cybersecurity: Improving Data Security Services

AI in Cybersecurity: Improving Data Security Services

1
Comments
4 min read
Seguridad y Robustez en Modelos de Aprendizaje Automático

Seguridad y Robustez en Modelos de Aprendizaje Automático

Comments
3 min read
How to Enhance File Security: Three Key Measures for Your Business

How to Enhance File Security: Three Key Measures for Your Business

Comments
2 min read
Embracing Tomorrow: The Future of 2FA

Embracing Tomorrow: The Future of 2FA

Comments 1
2 min read
Enhancing Security with FacePlugin’s ID Card Recognition from 200 countries

Enhancing Security with FacePlugin’s ID Card Recognition from 200 countries

Comments
2 min read
Boost Business Efficiency: Top 5 Workplace Technologies

Boost Business Efficiency: Top 5 Workplace Technologies

Comments
2 min read
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

Comments
2 min read
Unlocking the Future: How Biometrics Revolutionize Cybersecurity

Unlocking the Future: How Biometrics Revolutionize Cybersecurity

5
Comments
2 min read
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite

API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite

1
Comments
5 min read
The Future of Cybersecurity: Revolutionizing Protection with VerifyVault

The Future of Cybersecurity: Revolutionizing Protection with VerifyVault

3
Comments
2 min read
Secure your enterprise critical assets from secret sprawl

Secure your enterprise critical assets from secret sprawl

Comments
4 min read
The Crucial Risk Assessment Template for Cybersecurity

The Crucial Risk Assessment Template for Cybersecurity

Comments
7 min read
loading...