Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Turn Your VPS into an Impenetrable Fortress: How to Make Your Public Server Private Using Tailscale and UFW!

Turn Your VPS into an Impenetrable Fortress: How to Make Your Public Server Private Using Tailscale and UFW!

Comments
4 min read
The Intersection of Data Science and Cybersecurity

The Intersection of Data Science and Cybersecurity

4
Comments
3 min read
From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Rejections to Find My Calling

From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Rejections to Find My Calling

Comments
6 min read
A walkthrough to Sofia Santos' OSINT Exercise #002

A walkthrough to Sofia Santos' OSINT Exercise #002

Comments
2 min read
How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

Comments
5 min read
The Book Nook: A Tale of Cybersecurity and Community

The Book Nook: A Tale of Cybersecurity and Community

5
Comments
3 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments
3 min read
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
Automated Security Operations with Safeline WAF (Part 2)

Automated Security Operations with Safeline WAF (Part 2)

5
Comments
5 min read
Automated Security Operations with Safeline WAF (Part 1)

Automated Security Operations with Safeline WAF (Part 1)

5
Comments
4 min read
Configuring the SSL protocol for Open Source SafeLine WAF

Configuring the SSL protocol for Open Source SafeLine WAF

5
Comments
2 min read
Kong API Gateway x SafeLine, an Open Source WAF

Kong API Gateway x SafeLine, an Open Source WAF

5
Comments
2 min read
What is Application Security?

What is Application Security?

Comments
2 min read
WEP Encryption: The Theory Behind Network Security

WEP Encryption: The Theory Behind Network Security

Comments
4 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

10
Comments
3 min read
The 6 Best Web Application Firewalls Compared (2024)

The 6 Best Web Application Firewalls Compared (2024)

10
Comments
4 min read
WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes

WEP Fake Authentication Attack: Crack Weak Wi-Fi Security in Minutes

Comments
3 min read
Top 10 SBOM Tools to Inventory Your App Components

Top 10 SBOM Tools to Inventory Your App Components

Comments
7 min read
Exploiting Active Directory: How to Abuse Kerberos

Exploiting Active Directory: How to Abuse Kerberos

Comments
12 min read
Learning the basics of Osquery

Learning the basics of Osquery

Comments
4 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
O Problema da Cibersegurança Atual

O Problema da Cibersegurança Atual

Comments
3 min read
Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

2
Comments
4 min read
Building a Password Strength Checker in Python

Building a Password Strength Checker in Python

Comments
3 min read
LDAP (Lightweight Directory Access Protocol

LDAP (Lightweight Directory Access Protocol

Comments
3 min read
API Security Tools: Threat Protection vs. Testing & 8 Tools to Know

API Security Tools: Threat Protection vs. Testing & 8 Tools to Know

5
Comments
1 min read
My Portfolio

My Portfolio

Comments
1 min read
OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
Open API Usage Tutorial for Open Source WAF SafeLine

Open API Usage Tutorial for Open Source WAF SafeLine

16
Comments
2 min read
Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

Comments
1 min read
Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

Rethinking On-Premise Security: Lessons from Legacy Storage Hacks

Comments
5 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
What is Software Defined Networking (SDN)?

What is Software Defined Networking (SDN)?

Comments
3 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! đź”’

IT Security Made Simple: Protecting Your Digital Life Like a Pro! đź”’

Comments
2 min read
The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments
3 min read
HTTPS and SSLs: Why They Matter, How to Use Them

HTTPS and SSLs: Why They Matter, How to Use Them

Comments
5 min read
Types of Cybersecurity Solutions: Which one is the best for you?

Types of Cybersecurity Solutions: Which one is the best for you?

Comments
9 min read
Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

Comments
10 min read
A walkthrough to Sofia Santos' OSINT Exercise #001

A walkthrough to Sofia Santos' OSINT Exercise #001

1
Comments
3 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Comments
5 min read
Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Comments
6 min read
Building a Simple Image Encryption Tool Using Python

Building a Simple Image Encryption Tool Using Python

Comments
4 min read
What Is Packet Sniffing?

What Is Packet Sniffing?

Comments
3 min read
AI-Powered Ethical Hacking: Automating Penetration Testing in DevSecOps

AI-Powered Ethical Hacking: Automating Penetration Testing in DevSecOps

Comments
2 min read
Networking in Cybersecurity: The Essential Guide to Protecting Your Digital Infrastructure

Networking in Cybersecurity: The Essential Guide to Protecting Your Digital Infrastructure

Comments
1 min read
Implementing a Caesar Cipher Program in Python

Implementing a Caesar Cipher Program in Python

1
Comments
4 min read
Essential SecOps Practices Every Developer Should Know

Essential SecOps Practices Every Developer Should Know

Comments
5 min read
Passwords: Are they going extinct?

Passwords: Are they going extinct?

5
Comments
6 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
Implementing Network Security: A Guide to Modern Methodologies

Implementing Network Security: A Guide to Modern Methodologies

6
Comments 1
5 min read
Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Comments
3 min read
The Hidden Key: A Tale of Access Control

The Hidden Key: A Tale of Access Control

6
Comments
3 min read
Security is Usability — Examining Cybersecurity Erosion

Security is Usability — Examining Cybersecurity Erosion

Comments
8 min read
The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

Comments
2 min read
Another Blog Drop: Let's Dive Deep into C# Code Review with EasySharp by TryCrack.me ...... ⚡️📷

Another Blog Drop: Let's Dive Deep into C# Code Review with EasySharp by TryCrack.me ...... ⚡️📷

Comments
1 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Comments
1 min read
Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Seeking a Co-Founder or Collaborator for Innovative Geolocation-Based Cybersecurity Project

Comments
2 min read
loading...