DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Understanding Cross-Site Request Forgery (CSRF) Attacks: How They Work and How to Prevent Them

Comments
5 min read
CORS Misconfigurations in Laravel: Risks and Fixes

CORS Misconfigurations in Laravel: Risks and Fixes

2
Comments
3 min read
Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Detecting Insider Threats with File Integrity Monitoring: Practical Insights

Comments
5 min read
Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
🎖️ War in the Wires : The Silent Battlefield of Cyber Warfare

🎖️ War in the Wires : The Silent Battlefield of Cyber Warfare

1
Comments
6 min read
Breaking Down the OSI Model: A Cybersecurity Perspective

Breaking Down the OSI Model: A Cybersecurity Perspective

Comments
3 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Työkalu - Ubuntu vs Kali

Työkalu - Ubuntu vs Kali

Comments
2 min read
Advantages and Disadvantages of Artificial Intelligence

Advantages and Disadvantages of Artificial Intelligence

Comments
5 min read
Vietnam Launches a Unified Approach to Cyber Threats with Incident Response Alliance

Vietnam Launches a Unified Approach to Cyber Threats with Incident Response Alliance

Comments
2 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
End-To-End Encryption

End-To-End Encryption

Comments
3 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Welcome to Geeksta Paradise! 🌴💻

Welcome to Geeksta Paradise! 🌴💻

Comments
1 min read
Anyone Can Become Certified in Cybersecurity

Anyone Can Become Certified in Cybersecurity

Comments
3 min read
OWASP Top 10: What Every Developer Should Know About It

OWASP Top 10: What Every Developer Should Know About It

Comments
9 min read
Why protect undersea cables?

Why protect undersea cables?

1
Comments
1 min read
Automating Container Security: Building Self-Healing Systems with Docker Scout and DevSecOps Best Practices

Automating Container Security: Building Self-Healing Systems with Docker Scout and DevSecOps Best Practices

2
Comments
3 min read
Software Bill of Materials (SBOM) for your Spin Apps

Software Bill of Materials (SBOM) for your Spin Apps

Comments
9 min read
Why is Information Systems (IS) Auditing Important?

Why is Information Systems (IS) Auditing Important?

Comments
2 min read
GDPR Compliance: A Must-Have for Every Business in the Digital Age

GDPR Compliance: A Must-Have for Every Business in the Digital Age

Comments
4 min read
5 Reasons Startups Should Consider Using Locker.io for Secrets Management

5 Reasons Startups Should Consider Using Locker.io for Secrets Management

Comments
2 min read
Tại sao việc xoay vòng secrets tự động lại cực kỳ quan trọng?

Tại sao việc xoay vòng secrets tự động lại cực kỳ quan trọng?

Comments
4 min read
loading...