type_of stringclasses 1
value | id int64 12 2.31M | title stringlengths 1 256 ⌀ | description stringlengths 1 3.47k ⌀ | readable_publish_date stringlengths 5 10 | slug stringlengths 2 308 | path stringlengths 9 316 | url stringlengths 23 330 | comments_count int64 -3 1.19k | public_reactions_count int64 -82 4.01k | collection_id float64 60 30.7k ⌀ | published_timestamp stringlengths 20 20 | language stringclasses 95
values | subforem_id float64 1 1 ⌀ | positive_reactions_count int64 -82 4.01k | cover_image stringlengths 61 544 ⌀ | social_image stringlengths 61 544 | canonical_url stringlengths 15 452 | created_at stringlengths 20 20 | edited_at stringlengths 20 20 ⌀ | crossposted_at stringlengths 20 20 ⌀ | published_at stringlengths 20 20 | last_comment_at stringlengths 20 20 | reading_time_minutes int64 0 279 | tag_list stringlengths 5 121 | tags stringlengths 1 111 | user stringlengths 509 758 | organization stringlengths 501 629 ⌀ | flare_tag stringclasses 13
values | __index_level_0__ int64 0 722k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
article | 2,006,585 | # Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero | Disclaimer This post is for educational and informational purposes only. The methods... | Sep 20 '24 | -exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3 | /be11amer/-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3 | https://dev.to/be11amer/-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3 | 0 | 0 | null | 2024-09-20T18:29:11Z | en | null | 0 | https://dev.to/be11amer/-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3 | 2024-09-19T10:46:09Z | null | null | 2024-09-20T18:29:11Z | 2024-09-20T18:29:11Z | 5 | ['cybersecurity', 'infosec', 'wifi', 'testing'] | cybersecurity, infosec, wifi, testing | {'name': 'Bellamer', 'username': 'be11amer', 'twitter_username': 'Be11amer', 'github_username': None, 'user_id': 1919087, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpr... | null | null | 561,788 | ||
article | 2,004,665 | What are ITDR in cyber security? | ITDR stands for Identity Threat Detection and Response. It is a security practice and framework... | Sep 18 '24 | what-are-itdr-in-cyber-security-28b8 | /turingvangisms/what-are-itdr-in-cyber-security-28b8 | https://dev.to/turingvangisms/what-are-itdr-in-cyber-security-28b8 | 0 | 0 | null | 2024-09-18T04:15:19Z | en | null | 0 | null | https://dev.to/turingvangisms/what-are-itdr-in-cyber-security-28b8 | 2024-09-18T04:15:19Z | null | null | 2024-09-18T04:15:19Z | 2024-09-18T04:15:19Z | 1 | ['itdr', 'cyber', 'security', 'infosec'] | itdr, cyber, security, infosec | {'name': 'Turing', 'username': 'turingvangisms', 'twitter_username': 'TuringVangISMS', 'github_username': None, 'user_id': 2087125, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2... | null | null | 561,789 | |
article | 2,014,133 | Unified Kill Chain | Understanding the Unified Kill Chain: Strengthening Cybersecurity Against Threats In... | Sep 25 '24 | unified-kill-chain-p0f | /codacblack/unified-kill-chain-p0f | https://dev.to/codacblack/unified-kill-chain-p0f | 0 | 0 | null | 2024-09-25T09:20:49Z | en | null | 0 | https://dev.to/codacblack/unified-kill-chain-p0f | 2024-09-25T09:20:12Z | null | null | 2024-09-25T09:20:49Z | 2024-09-25T09:20:49Z | 3 | ['security', 'cybersecurity', 'infosec'] | security, cybersecurity, infosec | {'name': 'codac-black', 'username': 'codacblack', 'twitter_username': None, 'github_username': 'codac-black', 'user_id': 2123789, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fu... | null | null | 561,790 | ||
article | 2,036,452 | API Security: Threats, Tools, and Best Practices | What Is API Security? API security refers to the practices and protocols that are used to... | Oct 13 '24 | api-security-threats-tools-and-best-practices-2hl5 | /pynt/api-security-threats-tools-and-best-practices-2hl5 | https://dev.to/pynt/api-security-threats-tools-and-best-practices-2hl5 | 0 | 5 | null | 2024-10-13T12:33:43Z | en | null | 5 | https://dev.to/pynt/api-security-threats-tools-and-best-practices-2hl5 | 2024-10-13T12:33:44Z | 2024-11-07T09:38:48Z | null | 2024-10-13T12:33:43Z | 2024-10-13T12:33:43Z | 1 | ['appsec', 'infosec', 'owasp', 'api'] | appsec, infosec, owasp, api | {'name': 'Pynt.io', 'username': 'pynt', 'twitter_username': None, 'github_username': None, 'user_id': 2205391, 'website_url': 'https://www.pynt.io?ref=dev.to', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup... | null | null | 561,791 | ||
article | 2,032,853 | Supply Chain Risk Management Strategy with Sennovate | In the digital ecosystem of today, supply chain security is no longer a secondary concern, but a... | Oct 10 '24 | supply-chain-risk-management-strategy-with-sennovate-2163 | /sennovate/supply-chain-risk-management-strategy-with-sennovate-2163 | https://dev.to/sennovate/supply-chain-risk-management-strategy-with-sennovate-2163 | 0 | 1 | null | 2024-10-10T08:52:58Z | en | null | 1 | https://dev.to/sennovate/supply-chain-risk-management-strategy-with-sennovate-2163 | 2024-10-10T08:52:59Z | null | null | 2024-10-10T08:52:58Z | 2024-10-10T08:52:58Z | 4 | ['cybersecurity', 'zerotrust', 'security', 'infosec'] | cybersecurity, zerotrust, security, infosec | {'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | null | null | 561,792 | ||
article | 2,014,122 | How Does WAF Prevent OS Command Injection Attacks | OS command injection is a type of security vulnerability that allows an attacker to execute arbitrary... | Sep 25 '24 | how-does-waf-prevent-os-command-injection-attacks-1cbo | /carrie_luo1/how-does-waf-prevent-os-command-injection-attacks-1cbo | https://dev.to/carrie_luo1/how-does-waf-prevent-os-command-injection-attacks-1cbo | 0 | 2 | null | 2024-09-25T09:13:31Z | en | null | 2 | null | https://dev.to/carrie_luo1/how-does-waf-prevent-os-command-injection-attacks-1cbo | 2024-09-25T09:13:31Z | 2024-09-25T11:02:24Z | null | 2024-09-25T09:13:31Z | 2024-09-25T09:13:31Z | 5 | ['cybersecurity', 'infosec', 'webdev', 'security'] | cybersecurity, infosec, webdev, security | {'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon... | null | null | 561,793 | |
article | 2,014,044 | How Does WAF Prevent XSS Attacks | Cross-Site Scripting (XSS) attacks are a type of security vulnerability found in web applications... | Sep 25 '24 | how-does-waf-prevent-xss-attacks-3768 | /carrie_luo1/how-does-waf-prevent-xss-attacks-3768 | https://dev.to/carrie_luo1/how-does-waf-prevent-xss-attacks-3768 | 0 | 3 | null | 2024-09-25T08:01:17Z | en | null | 3 | null | https://dev.to/carrie_luo1/how-does-waf-prevent-xss-attacks-3768 | 2024-09-25T08:01:18Z | null | null | 2024-09-25T08:01:17Z | 2024-09-25T08:01:17Z | 5 | ['cybersecurity', 'infosec'] | cybersecurity, infosec | {'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon... | null | null | 561,794 | |
article | 2,012,466 | Top 5 Website Data Leakage Events 2024 | 1. MOVEit: The MOVEit Managed File Transfer application suffered a massive data breach impacting... | Sep 24 '24 | top-5-website-data-leakage-events-2024-ed7 | /carrie_luo1/top-5-website-data-leakage-events-2024-ed7 | https://dev.to/carrie_luo1/top-5-website-data-leakage-events-2024-ed7 | 0 | 2 | null | 2024-09-24T09:50:17Z | en | null | 2 | null | https://dev.to/carrie_luo1/top-5-website-data-leakage-events-2024-ed7 | 2024-09-24T09:50:18Z | 2024-09-24T09:51:10Z | null | 2024-09-24T09:50:17Z | 2024-09-24T09:50:17Z | 2 | ['cybersecurity', 'infosec'] | cybersecurity, infosec | {'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon... | null | null | 561,795 | |
article | 2,007,590 | Why You Need to Protect Your Website and How | Protecting your website is crucial for several reasons, including safeguarding sensitive information,... | Sep 20 '24 | why-you-need-to-protect-your-website-and-how-59cp | /carrie_luo1/why-you-need-to-protect-your-website-and-how-59cp | https://dev.to/carrie_luo1/why-you-need-to-protect-your-website-and-how-59cp | 0 | 6 | null | 2024-09-20T06:28:07Z | en | null | 6 | null | https://dev.to/carrie_luo1/why-you-need-to-protect-your-website-and-how-59cp | 2024-09-20T06:28:08Z | null | null | 2024-09-20T06:28:07Z | 2024-09-20T06:28:07Z | 3 | ['webdev', 'cybersecurity', 'infosec'] | webdev, cybersecurity, infosec | {'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon... | null | null | 561,796 | |
article | 1,939,711 | Why the Crowdstrike Incident is NOT Solely Crowdstrike’s Fault | In the past week, the cybersecurity community has been abuzz with news of an incident involving... | Jul 29 '24 | why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4 | /sennovate/why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4 | https://dev.to/sennovate/why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4 | 0 | 0 | null | 2024-07-29T08:38:09Z | en | null | 0 | https://dev.to/sennovate/why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4 | 2024-07-29T08:38:10Z | 2024-07-29T08:40:55Z | null | 2024-07-29T08:38:09Z | 2024-07-29T08:38:09Z | 3 | ['crowdstrike', 'cybersecurity', 'security', 'infosec'] | crowdstrike, cybersecurity, security, infosec | {'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | null | null | 561,797 | ||
article | 1,928,776 | Common SOC Challenges and How to Overcome Them | Security Operations Centers (SOCs) play a crucial role in identifying and remediating cybersecurity... | Jul 19 '24 | common-soc-challenges-and-how-to-overcome-them-2bcd | /sennovate/common-soc-challenges-and-how-to-overcome-them-2bcd | https://dev.to/sennovate/common-soc-challenges-and-how-to-overcome-them-2bcd | 0 | 0 | null | 2024-07-19T09:15:46Z | en | null | 0 | https://dev.to/sennovate/common-soc-challenges-and-how-to-overcome-them-2bcd | 2024-07-19T09:15:46Z | 2024-07-19T09:16:20Z | null | 2024-07-19T09:15:46Z | 2024-07-19T09:15:46Z | 4 | ['soc', 'security', 'cybersecurity', 'infosec'] | soc, security, cybersecurity, infosec | {'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | null | null | 561,798 | ||
article | 1,961,243 | Examining Data About the Linux System | As part of my journey in cybersecurity, I have learned about the complexity of Linux systems. Both... | Aug 16 '24 | examining-data-about-the-linux-system-3g5c | /b3secur3/examining-data-about-the-linux-system-3g5c | https://dev.to/b3secur3/examining-data-about-the-linux-system-3g5c | 2 | 0 | null | 2024-08-16T09:08:26Z | en | null | 0 | https://dev.to/b3secur3/examining-data-about-the-linux-system-3g5c | 2024-08-16T09:08:27Z | null | null | 2024-08-16T09:08:26Z | 2024-08-16T10:25:18Z | 2 | ['cybersecurity', 'linux', 'devops', 'infosec'] | cybersecurity, linux, devops, infosec | {'name': 'Urah', 'username': 'b3secur3', 'twitter_username': None, 'github_username': None, 'user_id': 1935698, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_imag... | null | null | 561,799 | ||
article | 1,961,315 | Starting Out in Cybersecurity: My Journey and First Steps | 🚀 Introduction Embarking on a journey into cybersecurity can feel like stepping into an expansive,... | Aug 16 '24 | starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8 | /b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8 | https://dev.to/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8 | 0 | 2 | null | 2024-08-16T10:10:26Z | en | null | 2 | null | https://dev.to/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8 | 2024-08-16T10:10:26Z | 2024-08-16T10:24:27Z | null | 2024-08-16T10:10:26Z | 2024-08-16T10:10:26Z | 2 | ['cybersecurity', 'infosec', 'learningjourney', 'careeradvice'] | cybersecurity, infosec, learningjourney, careeradvice | {'name': 'Urah', 'username': 'b3secur3', 'twitter_username': None, 'github_username': None, 'user_id': 1935698, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_imag... | null | null | 561,800 | |
article | 1,954,857 | [picoctf] Scan Surprise writeup | Title: Scan Surprise Author: Jeffery John Date: 8/10/2024 ... | Aug 10 '24 | picoctfscan-surprise-2506 | /zerogru/picoctfscan-surprise-2506 | https://dev.to/zerogru/picoctfscan-surprise-2506 | 0 | 5 | null | 2024-08-10T21:17:30Z | en | null | 5 | null | https://dev.to/zerogru/picoctfscan-surprise-2506 | 2024-08-10T21:17:30Z | 2024-08-10T21:19:50Z | null | 2024-08-10T21:17:30Z | 2024-08-10T21:17:30Z | 1 | ['security', 'hacker', 'infosec', 'linux'] | security, hacker, infosec, linux | {'name': 'zerogru', 'username': 'zerogru', 'twitter_username': None, 'github_username': None, 'user_id': 1911735, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_im... | null | null | 561,801 | |
article | 1,931,932 | Credit Card Tokenization API | PCI Vault) is a vendor neutral, zero-knowledge, PCI DSS level 1 compliant environment. It is a SaaS... | Jul 22 '24 | pci-vault-1o30 | /creditcardtokenization/pci-vault-1o30 | https://dev.to/creditcardtokenization/pci-vault-1o30 | 0 | 0 | null | 2024-07-22T13:56:12Z | en | null | 0 | https://dev.to/creditcardtokenization/pci-vault-1o30 | 2024-07-22T13:56:13Z | 2024-07-22T14:08:24Z | null | 2024-07-22T13:56:12Z | 2024-07-22T13:56:12Z | 1 | ['go', 'cybersecurity', 'infosec', 'aws'] | go, cybersecurity, infosec, aws | {'name': 'PCI Vault', 'username': 'creditcardtokenization', 'twitter_username': None, 'github_username': None, 'user_id': 1820174, 'website_url': 'https://pcivault.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws... | null | null | 561,802 | ||
article | 1,910,328 | Secure Your AS400 Systems with Sennovate’s Managed Detection and Response (MDR) Service | In the cyber threat landscape, protecting important business systems such as AS400 is critical.... | Jul 3 '24 | secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8 | /sennovate/secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8 | https://dev.to/sennovate/secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8 | 0 | 0 | null | 2024-07-03T15:14:28Z | en | null | 0 | https://dev.to/sennovate/secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8 | 2024-07-03T15:14:29Z | null | null | 2024-07-03T15:14:28Z | 2024-07-03T15:14:28Z | 3 | ['cybersecurity', 'security', 'infosec', 'mdr'] | cybersecurity, security, infosec, mdr | {'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | null | null | 561,803 | ||
article | 1,956,350 | Why SafeLine Might Be the Best Free WAF | Verifying SafeLine’s Effectiveness: A Comprehensive Evaluation ... | Aug 12 '24 | why-safeline-might-be-the-best-free-waf-23o7 | /motorbuy6/why-safeline-might-be-the-best-free-waf-23o7 | https://dev.to/motorbuy6/why-safeline-might-be-the-best-free-waf-23o7 | 0 | 1 | null | 2024-08-12T11:05:50Z | en | null | 1 | null | https://dev.to/motorbuy6/why-safeline-might-be-the-best-free-waf-23o7 | 2024-08-12T11:05:51Z | 2024-08-12T11:06:56Z | null | 2024-08-12T11:05:50Z | 2024-08-12T11:05:50Z | 3 | ['cybersecurity', 'waf', 'infosec', 'opensource'] | cybersecurity, waf, infosec, opensource | {'name': 'MotorBuy6', 'username': 'motorbuy6', 'twitter_username': None, 'github_username': None, 'user_id': 1733862, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofil... | null | null | 561,804 | |
article | 1,952,957 | Effortless Security: Protect Your Site with a Free Open-Source WAF | Hey friends! Today, I'm really excited to share an free WAF with you—the SafeLine Community Edition.... | Aug 9 '24 | effortless-security-protect-your-site-with-a-free-open-source-waf-28j6 | /sherbertill6/effortless-security-protect-your-site-with-a-free-open-source-waf-28j6 | https://dev.to/sherbertill6/effortless-security-protect-your-site-with-a-free-open-source-waf-28j6 | 0 | 5 | null | 2024-08-09T03:01:38Z | en | null | 5 | null | https://dev.to/sherbertill6/effortless-security-protect-your-site-with-a-free-open-source-waf-28j6 | 2024-08-09T03:01:39Z | null | null | 2024-08-09T03:01:38Z | 2024-08-09T03:01:38Z | 2 | ['opensource', 'cybersecurity', 'infosec', 'security'] | opensource, cybersecurity, infosec, security | {'name': 'SherbertIll6', 'username': 'sherbertill6', 'twitter_username': None, 'github_username': None, 'user_id': 1733804, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2F... | null | null | 561,805 | |
article | 1,918,615 | Essential Frameworks, Standards, and Programs for Building a Robust Information Security Plan | Cybersecurity Standards | Jul 10 '24 | essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo | /saramazal/essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo | https://dev.to/saramazal/essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo | 0 | 1 | null | 2024-07-10T14:14:21Z | en | null | 1 | null | https://dev.to/saramazal/essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo | 2024-07-10T14:08:11Z | null | null | 2024-07-10T14:14:21Z | 2024-07-10T14:14:21Z | 3 | ['cybersecurity', 'infosec', 'nist', 'ethicalhacking'] | cybersecurity, infosec, nist, ethicalhacking | {'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona... | null | null | 561,806 | |
article | 1,918,531 | What Every Cyber Specialist Needs to Know About Computer Structure | Cybersecurity and Computer Structure | Jul 10 '24 | what-every-cyber-specialist-needs-to-know-about-computer-structure-5100 | /saramazal/what-every-cyber-specialist-needs-to-know-about-computer-structure-5100 | https://dev.to/saramazal/what-every-cyber-specialist-needs-to-know-about-computer-structure-5100 | 0 | 1 | null | 2024-07-10T13:00:43Z | en | null | 1 | null | https://dev.to/saramazal/what-every-cyber-specialist-needs-to-know-about-computer-structure-5100 | 2024-07-10T12:59:28Z | null | null | 2024-07-10T13:00:43Z | 2024-07-10T13:00:43Z | 2 | ['cybersecurity', 'computer', 'ethicalhacking', 'infosec'] | cybersecurity, computer, ethicalhacking, infosec | {'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona... | null | null | 561,807 | |
article | 1,918,285 | Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity | exploitDB | Jul 10 '24 | exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl | /saramazal/exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl | https://dev.to/saramazal/exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl | 0 | 1 | null | 2024-07-10T09:03:42Z | en | null | 1 | null | https://dev.to/saramazal/exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl | 2024-07-10T09:02:59Z | 2024-07-10T13:08:56Z | null | 2024-07-10T09:03:42Z | 2024-07-10T09:03:42Z | 2 | ['cybersecurity', 'infosec', 'pentesting', 'webdev'] | cybersecurity, infosec, pentesting, webdev | {'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona... | null | null | 561,808 | |
article | 1,918,267 | Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals | Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity... | Jul 10 '24 | understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6 | /saramazal/understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6 | https://dev.to/saramazal/understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6 | 0 | 0 | null | 2024-07-10T08:44:54Z | en | null | 0 | null | https://dev.to/saramazal/understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6 | 2024-07-10T08:40:02Z | null | null | 2024-07-10T08:44:54Z | 2024-07-10T08:44:54Z | 2 | ['mitreattack', 'infosec', 'redteam', 'cybersecurity'] | mitreattack, infosec, redteam, cybersecurity | {'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona... | null | null | 561,809 | |
article | 1,918,177 | Understanding the Distinction Between Information Security and Cybersecurity | InfoSec & cyber | Jul 10 '24 | understanding-the-distinction-between-information-security-and-cybersecurity-pn | /saramazal/understanding-the-distinction-between-information-security-and-cybersecurity-pn | https://dev.to/saramazal/understanding-the-distinction-between-information-security-and-cybersecurity-pn | 0 | 0 | null | 2024-07-10T07:23:56Z | en | null | 0 | null | https://dev.to/saramazal/understanding-the-distinction-between-information-security-and-cybersecurity-pn | 2024-07-10T07:16:03Z | 2024-07-10T13:09:49Z | null | 2024-07-10T07:23:56Z | 2024-07-10T07:23:56Z | 2 | ['infosec', 'cybersecurity', 'webdev', 'appsec'] | infosec, cybersecurity, webdev, appsec | {'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona... | null | null | 561,810 | |
article | 1,903,585 | Explorando abordagens de análise na Engenharia reversa: | A Engenharia reversa é crucial para diversas aplicações, desde a detecção e mitigação de malware até... | Jun 28 '24 | explorando-abordagens-de-analise-na-engenharia-reversa-54f8 | /ocafeeoelefante/explorando-abordagens-de-analise-na-engenharia-reversa-54f8 | https://dev.to/ocafeeoelefante/explorando-abordagens-de-analise-na-engenharia-reversa-54f8 | 2 | 41 | null | 2024-06-28T04:15:48Z | pt | null | 41 | null | https://dev.to/ocafeeoelefante/explorando-abordagens-de-analise-na-engenharia-reversa-54f8 | 2024-06-28T04:15:48Z | 2024-06-28T04:28:57Z | null | 2024-06-28T04:15:48Z | 2024-09-08T03:55:55Z | 4 | ['engenhariareversa', 'cybersecurity', 'reversing', 'infosec'] | engenhariareversa, cybersecurity, reversing, infosec | {'name': 'Pamie.', 'username': 'ocafeeoelefante', 'twitter_username': 'ocafeeoelefante', 'github_username': None, 'user_id': 1467450, 'website_url': 'https://github.com/ocafeeoelefante', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-up... | null | null | 561,811 | |
article | 1,889,542 | Types of Computer Security Threats | From mobile banking to online shopping, from healthcare systems to smart devices, software... | Jun 15 '24 | types-of-computer-security-threats-dc8 | /jusufoski/types-of-computer-security-threats-dc8 | https://dev.to/jusufoski/types-of-computer-security-threats-dc8 | 0 | 1 | null | 2024-06-15T12:40:26Z | en | null | 1 | https://infosafe24.com/posts/Types-of-Computer-Security-Threats | 2024-06-15T12:38:15Z | null | null | 2024-06-15T12:40:26Z | 2024-06-15T12:40:26Z | 8 | ['cybersecurity', 'infosec', 'security', 'informationsecurity'] | cybersecurity, infosec, security, informationsecurity | {'name': 'Zeki', 'username': 'jusufoski', 'twitter_username': 'ctextit', 'github_username': None, 'user_id': 1475895, 'website_url': 'https://codeline24.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup... | null | null | 561,812 | ||
article | 1,833,202 | The Open-Source Backdoor That Almost Compromised SSH | Researchers discovered a backdoor in the compression tools xz Utils versions 5.6.0 and 5.6.1,... | Apr 24 '24 | the-open-source-backdoor-that-almost-compromised-ssh-2lcg | /gitguardian/the-open-source-backdoor-that-almost-compromised-ssh-2lcg | https://dev.to/gitguardian/the-open-source-backdoor-that-almost-compromised-ssh-2lcg | 0 | 2 | null | 2024-04-24T15:45:38Z | en | null | 2 | https://blog.gitguardian.com/the-backdoor-that-almost-compromised-ssh-security/ | 2024-04-24T15:45:39Z | null | null | 2024-04-24T15:45:38Z | 2024-04-24T15:45:38Z | 3 | ['security', 'infosec', 'opensource', 'github'] | security, infosec, opensource, github | {'name': 'Thomas Segura', 'username': 'segudev', 'twitter_username': None, 'github_username': 'segudev', 'user_id': 141347, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2F... | {'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png... | null | 561,813 | ||
article | 1,770,713 | 5 Card Skimming Methods Every Infosec Pro Needs to Know | Cybercriminals are notoriously adept at evolving their strategies and tactics to defraud individuals... | Feb 24 '24 | 5-card-skimming-methods-every-infosec-pro-needs-to-know-1ige | /yayabobi/5-card-skimming-methods-every-infosec-pro-needs-to-know-1ige | https://dev.to/yayabobi/5-card-skimming-methods-every-infosec-pro-needs-to-know-1ige | 0 | 0 | null | 2024-02-24T04:18:09Z | en | null | 0 | null | https://www.memcyco.com/home/card-skimming-methods/ | 2024-02-24T04:18:10Z | null | null | 2024-02-24T04:18:09Z | 2024-02-24T04:18:09Z | 6 | ['infosec', 'cybersecurity', 'webdev'] | infosec, cybersecurity, webdev | {'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro... | null | null | 561,814 | |
article | 1,778,521 | A simple tip to find hidden gems in Shodan | Shodan is a well-known recon tool, but in larger scopes, it has so many results that it’s hard to... | Mar 3 '24 | a-simple-tip-to-find-hidden-gems-in-shodan-2c92 | /menna/a-simple-tip-to-find-hidden-gems-in-shodan-2c92 | https://dev.to/menna/a-simple-tip-to-find-hidden-gems-in-shodan-2c92 | 0 | 0 | null | 2024-03-03T03:55:28Z | en | null | 0 | null | https://dev.to/menna/a-simple-tip-to-find-hidden-gems-in-shodan-2c92 | 2024-03-03T03:55:29Z | null | null | 2024-03-03T03:55:28Z | 2024-03-03T03:55:28Z | 2 | ['security', 'infosec', 'cybersecurity'] | security, infosec, cybersecurity | {'name': 'Bruno', 'username': 'menna', 'twitter_username': None, 'github_username': 'b-hermes', 'user_id': 1321114, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_... | null | null | 561,815 | |
article | 1,787,738 | What is PII? | Curious about what personally identifiable information (PII) is? PII is any information that can be... | Mar 12 '24 | what-is-pii-699 | /strongboxit/what-is-pii-699 | https://dev.to/strongboxit/what-is-pii-699 | 0 | 1 | null | 2024-03-12T08:55:08Z | en | null | 1 | null | https://dev.to/strongboxit/what-is-pii-699 | 2024-03-12T08:51:37Z | null | null | 2024-03-12T08:55:08Z | 2024-03-12T08:55:08Z | 1 | ['cybersecurity', 'pii', 'infosec', 'ai'] | cybersecurity, pii, infosec, ai | {'name': 'StrongBox IT', 'username': 'strongboxit', 'twitter_username': None, 'github_username': None, 'user_id': 1204198, 'website_url': 'https://www.strongboxit.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaw... | null | null | 561,816 | |
article | 1,717,074 | Understanding the Twitter Hack of 2020: A Deep Dive | Understanding the Twitter Hack of 2020: A Deep Dive In July 2020, Twitter faced one of the... | Jan 4 '24 | understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4 | /nikitakoselev/understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4 | https://dev.to/nikitakoselev/understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4 | 0 | 4 | null | 2024-01-04T12:59:58Z | en | null | 4 | https://dev.to/nikitakoselev/understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4 | 2024-01-04T12:59:59Z | null | null | 2024-01-04T12:59:58Z | 2024-01-04T12:59:58Z | 2 | ['twitterhack', 'cybersecurity', 'socialengineering', 'infosec'] | twitterhack, cybersecurity, socialengineering, infosec | {'name': 'Nikita Koselev', 'username': 'nikitakoselev', 'twitter_username': 'NikitaKoselev', 'github_username': 'nikitakoselev', 'user_id': 178396, 'website_url': 'https://linkfree.io/nikitakoselev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2... | null | null | 561,817 | ||
article | 1,715,744 | What is Infrastructure Security? | Infrastructure security is the protection of the various components that support the functionality of... | Jan 3 '24 | what-is-infrastructure-security-34g3 | /donesrom/what-is-infrastructure-security-34g3 | https://dev.to/donesrom/what-is-infrastructure-security-34g3 | 4 | 4 | null | 2024-01-03T10:31:13Z | en | null | 4 | https://dev.to/donesrom/what-is-infrastructure-security-34g3 | 2024-01-03T10:31:14Z | 2024-01-04T08:07:05Z | null | 2024-01-03T10:31:13Z | 2024-09-13T09:56:39Z | 7 | ['security', 'infrastructuresecurity', 'cybersecurity', 'infosec'] | security, infrastructuresecurity, cybersecurity, infosec | {'name': 'Donesrom', 'username': 'donesrom', 'twitter_username': None, 'github_username': 'Donesrom', 'user_id': 1032083, 'website_url': 'https://donesrom.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu... | null | null | 561,818 | ||
article | 1,676,042 | Securing AWS Environments Against Ransomware | In today's increasingly interconnected world, organizations are turning to cloud platforms like... | Nov 23 '23 | securing-aws-environments-against-ransomware-3a0d | /aws-builders/securing-aws-environments-against-ransomware-3a0d | https://dev.to/aws-builders/securing-aws-environments-against-ransomware-3a0d | 0 | 2 | null | 2023-11-23T07:58:47Z | en | null | 2 | null | https://dev.to/aws-builders/securing-aws-environments-against-ransomware-3a0d | 2023-11-23T07:58:48Z | null | null | 2023-11-23T07:58:47Z | 2023-11-23T07:58:47Z | 3 | ['awssecurity', 'ransomware', 'infosec', 'cloudsecurity'] | awssecurity, ransomware, infosec, cloudsecurity | {'name': 'Wilklins Nyatteng', 'username': 'wilklins', 'twitter_username': 'wilklins__', 'github_username': 'WILKLINS', 'user_id': 1037358, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup... | {'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae... | null | 561,819 | |
article | 1,632,978 | The InfoSec Guide to the Principles of Zero Trust | "Never trust, always verify." Sounds a little paranoid, doesn't it? But it's the key principle behind... | Oct 12 '23 | the-infosec-guide-to-the-principles-of-zero-trust-3d1i | /yayabobi/the-infosec-guide-to-the-principles-of-zero-trust-3d1i | https://dev.to/yayabobi/the-infosec-guide-to-the-principles-of-zero-trust-3d1i | 0 | 0 | null | 2023-10-12T18:15:55Z | en | null | 0 | null | https://cybeready.com/category/the-infosec-guide-to-the-principles-of-zero-trust | 2023-10-12T18:15:55Z | null | null | 2023-10-12T18:15:55Z | 2023-10-12T18:15:55Z | 12 | ['infosec', 'cybersecurity', 'zerotrus', 'devops'] | infosec, cybersecurity, zerotrus, devops | {'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro... | null | null | 561,820 | |
article | 1,667,146 | Black Hat MEA 2023 | 🔒As RELIANOID are a excited cybersecurity professional team with a passion for staying at the... | Nov 15 '23 | black-hat-mea-2023-54po | /relianoid/black-hat-mea-2023-54po | https://dev.to/relianoid/black-hat-mea-2023-54po | 0 | 0 | null | 2023-11-15T08:54:43Z | en | null | 0 | null | https://dev.to/relianoid/black-hat-mea-2023-54po | 2023-11-15T08:54:43Z | 2023-11-16T08:33:18Z | null | 2023-11-15T08:54:43Z | 2023-11-15T08:54:43Z | 1 | ['cybersecurity', 'infosec', 'security', 'blackhat'] | cybersecurity, infosec, security, blackhat | {'name': 'relianoid', 'username': 'relianoid', 'twitter_username': 'relianoid', 'github_username': None, 'user_id': 1159382, 'website_url': 'https://www.relianoid.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaw... | null | null | 561,821 | |
article | 1,656,044 | Data Integrity for the Lab: An Introduction | What you will learn if you follow this series (in no particular order) Concepts... | Nov 3 '23 | lab-data-integrity-issue-1-j65 | /cantum/lab-data-integrity-issue-1-j65 | https://dev.to/cantum/lab-data-integrity-issue-1-j65 | 0 | 0 | 25,271 | 2023-11-03T17:59:02Z | en | null | 0 | null | https://dev.to/cantum/lab-data-integrity-issue-1-j65 | 2023-11-03T15:01:43Z | 2024-10-11T11:13:57Z | null | 2023-11-03T17:59:02Z | 2023-11-03T17:59:02Z | 3 | ['lab', 'security', 'infosec', 'gamp'] | lab, security, infosec, gamp | {'name': 'Michael Cantu', 'username': 'cantum', 'twitter_username': None, 'github_username': 'cantum-tech', 'user_id': 840012, 'website_url': 'https://hirocan.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com... | null | null | 561,822 | |
article | 1,606,949 | How will ISO/IEC 27001 benefit any organization? | ISO/IEC 27001:2022 is the latest version of the international standard for information security... | Sep 21 '23 | how-will-isoiec-27001-benefit-my-organization-3gg7 | /prachiarana/how-will-isoiec-27001-benefit-my-organization-3gg7 | https://dev.to/prachiarana/how-will-isoiec-27001-benefit-my-organization-3gg7 | 0 | 0 | null | 2023-09-21T08:29:54Z | en | null | 0 | https://dev.to/prachiarana/how-will-isoiec-27001-benefit-my-organization-3gg7 | 2023-09-21T08:29:54Z | 2023-09-21T08:35:41Z | null | 2023-09-21T08:29:54Z | 2023-09-21T08:29:54Z | 2 | ['security', 'cybersecurity', 'informationsecurity', 'infosec'] | security, cybersecurity, informationsecurity, infosec | {'name': 'Prachi Rana', 'username': 'prachiarana', 'twitter_username': None, 'github_username': None, 'user_id': 1166695, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpr... | null | null | 561,823 | ||
article | 1,579,819 | Dado ou informação? | Dado e informação desempenham um papel extremamente importante na era atual. Atualmente vivemos em um... | Aug 25 '23 | dado-ou-informacao-15f | /diegocorredeira/dado-ou-informacao-15f | https://dev.to/diegocorredeira/dado-ou-informacao-15f | 0 | 0 | null | 2023-08-25T13:32:26Z | pt | null | 0 | null | https://dev.to/diegocorredeira/dado-ou-informacao-15f | 2023-08-25T13:32:26Z | 2023-08-25T13:34:37Z | null | 2023-08-25T13:32:26Z | 2023-08-25T13:32:26Z | 3 | ['infosec', 'beginners'] | infosec, beginners | {'name': 'Diego', 'username': 'diegocorredeira', 'twitter_username': None, 'github_username': 'DiegoCorredeira', 'user_id': 1144868, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%... | null | null | 561,824 | |
article | 1,593,799 | Security: How to Discover Hidden API's | Unlock the secrets of API security! Don't miss our informative webinar hosted by True Positives,... | Sep 8 '23 | security-how-to-discover-hidden-apis-5107 | /brianpavicic/security-how-to-discover-hidden-apis-5107 | https://dev.to/brianpavicic/security-how-to-discover-hidden-apis-5107 | 0 | 1 | null | 2023-09-08T15:29:42Z | en | null | 1 | https://dev.to/brianpavicic/security-how-to-discover-hidden-apis-5107 | 2023-09-08T15:29:43Z | null | null | 2023-09-08T15:29:42Z | 2023-09-08T15:29:42Z | 1 | ['security', 'tooling', 'infosec', 'api'] | security, tooling, infosec, api | {'name': 'Brian Pavicic', 'username': 'brianpavicic', 'twitter_username': 'TruePositives', 'github_username': None, 'user_id': 948291, 'website_url': 'https://www.true-positives.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploa... | null | null | 561,825 | ||
article | 1,593,091 | Getting Started in Infosec | Encryption Fundamentals Understanding encryption is foundational for anyone diving into... | Sep 8 '23 | getting-started-in-infosec-5fp3 | /ghrake/getting-started-in-infosec-5fp3 | https://dev.to/ghrake/getting-started-in-infosec-5fp3 | 0 | 1 | null | 2023-09-08T00:33:59Z | en | null | 1 | https://dev.to/ghrake/getting-started-in-infosec-5fp3 | 2023-09-08T00:34:00Z | null | null | 2023-09-08T00:33:59Z | 2023-09-08T00:33:59Z | 3 | ['infosec', 'beginners', 'pentesting', 'ethicalhacking'] | infosec, beginners, pentesting, ethicalhacking | {'name': 'Rake', 'username': 'ghrake', 'twitter_username': None, 'github_username': 'GH-Rake', 'user_id': 579933, 'website_url': 'https://guidedhacking.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo... | null | null | 561,826 | ||
article | 1,580,662 | An Introduction for Developers to Information Security | Table of Content Introduction - Remembering the man who saved 17 million... | Aug 26 '23 | information-security-4lhe | /mahdichaari01/information-security-4lhe | https://dev.to/mahdichaari01/information-security-4lhe | 0 | 4 | 24,361 | 2023-08-26T12:50:37Z | en | null | 4 | https://dev.to/mahdichaari01/information-security-4lhe | 2023-08-26T12:45:13Z | 2023-08-27T16:06:58Z | null | 2023-08-26T12:50:37Z | 2023-08-26T12:50:37Z | 6 | ['security', 'infosec', 'development', 'softwareengineering'] | security, infosec, development, softwareengineering | {'name': 'Mahdi Chaari', 'username': 'mahdichaari01', 'twitter_username': None, 'github_username': 'mahdichaari01', 'user_id': 1039848, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploa... | null | null | 561,827 | ||
article | 1,568,588 | Single Sign-On (SSO): The Key to Secure and Convenient Modern Authentication | Single Sign-On(SSO) is an authentication system that allows users to use a single set of credentials... | Aug 14 '23 | the-role-of-single-sign-on-sso-in-modern-authentication-3k09 | /donesrom/the-role-of-single-sign-on-sso-in-modern-authentication-3k09 | https://dev.to/donesrom/the-role-of-single-sign-on-sso-in-modern-authentication-3k09 | 0 | 2 | null | 2023-08-14T22:16:50Z | en | null | 2 | https://dev.to/donesrom/the-role-of-single-sign-on-sso-in-modern-authentication-3k09 | 2023-08-14T22:16:50Z | 2023-08-14T22:26:44Z | null | 2023-08-14T22:16:50Z | 2023-08-14T22:16:50Z | 7 | ['sso', 'cybersecurity', 'infosec'] | sso, cybersecurity, infosec | {'name': 'Donesrom', 'username': 'donesrom', 'twitter_username': None, 'github_username': 'Donesrom', 'user_id': 1032083, 'website_url': 'https://donesrom.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu... | null | null | 561,828 | ||
article | 1,559,395 | SQL injection in Rails - Learn from an attacker’s shoes | Imagine a scenario where an attacker gains unauthorized access to your application's database,... | Aug 4 '23 | sql-injection-in-rails-learn-from-an-attackers-shoes-3o69 | /haseebeqx/sql-injection-in-rails-learn-from-an-attackers-shoes-3o69 | https://dev.to/haseebeqx/sql-injection-in-rails-learn-from-an-attackers-shoes-3o69 | 0 | 5 | null | 2023-08-04T19:13:16Z | en | null | 5 | null | https://dev.to/haseebeqx/sql-injection-in-rails-learn-from-an-attackers-shoes-3o69 | 2023-08-04T17:06:37Z | 2024-07-11T07:38:57Z | null | 2023-08-04T19:13:16Z | 2023-08-04T19:13:16Z | 6 | ['rails', 'security', 'infosec'] | rails, security, infosec | {'name': 'Haseeb Annadamban', 'username': 'haseebeqx', 'twitter_username': 'Haseebeqx', 'github_username': 'haseebeqx', 'user_id': 17618, 'website_url': 'https://haseebeqx.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.... | null | null | 561,830 | |
article | 1,535,238 | Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears | Introduction In this blog post, we dive into the intricacies of the Sudo Heap Overflow... | Jul 12 '23 | unveiling-the-sudo-heap-overflow-vulnerability-cve-2021-3156-a-critical-security-flaw-reappears-1ocf | /tutorialboy/unveiling-the-sudo-heap-overflow-vulnerability-cve-2021-3156-a-critical-security-flaw-reappears-1ocf | https://dev.to/tutorialboy/unveiling-the-sudo-heap-overflow-vulnerability-cve-2021-3156-a-critical-security-flaw-reappears-1ocf | 0 | 1 | 20,294 | 2023-07-12T20:18:43Z | en | null | 1 | https://tutorialboy24.blogspot.com/2023/07/unveiling-sudo-heap-overflow.html | 2023-07-12T20:18:43Z | 2023-07-12T20:19:05Z | null | 2023-07-12T20:18:43Z | 2023-07-12T20:18:43Z | 13 | ['cybersecurity', 'infosec', 'linux', 'cve'] | cybersecurity, infosec, linux, cve | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,831 | ||
article | 1,436,072 | Security By Design | We consider many things valuable in our lives: money, freedom, and homes, for instance. Yet all of... | Apr 14 '23 | security-by-design-3ip2 | /prove/security-by-design-3ip2 | https://dev.to/prove/security-by-design-3ip2 | 0 | 1 | null | 2023-04-14T17:32:27Z | null | null | 1 | https://www.prove.com/blog/security-by-design | 2023-04-14T17:32:28Z | null | null | 2023-04-14T17:32:27Z | 2023-04-14T17:32:27Z | 4 | ['prove', 'security', 'pii', 'infosec'] | prove, security, pii, infosec | {'name': 'Nicholas DeWald', 'username': 'ndewald', 'twitter_username': None, 'github_username': None, 'user_id': 1020255, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpr... | {'name': 'Prove Identity', 'username': 'prove', 'slug': 'prove', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6588%2F3532448a-d161-4f1f-afe8-afdd3aabf660.png', 'profi... | null | 561,832 | ||
article | 1,461,853 | Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts | Introduction This is rewritten article from the bugcrowd report submitted by the security... | May 8 '23 | authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci | /tutorialboy/authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci | https://dev.to/tutorialboy/authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci | 0 | 9 | null | 2023-05-08T23:45:55Z | null | null | 9 | https://dev.to/tutorialboy/authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci | 2023-05-08T23:45:55Z | 2023-05-08T23:46:14Z | null | 2023-05-08T23:45:55Z | 2023-05-08T23:45:55Z | 4 | ['cybersecurity', 'infosec', 'informationsecurity', 'opensource'] | cybersecurity, infosec, informationsecurity, opensource | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,833 | ||
article | 1,449,187 | How to automate compliance checks with AWS Audit Manager | AWS Audit Manager is a service that simplifies the process of auditing and managing compliance... | Apr 26 '23 | how-to-automate-compliance-checks-with-aws-audit-manager-2f8n | /aws-builders/how-to-automate-compliance-checks-with-aws-audit-manager-2f8n | https://dev.to/aws-builders/how-to-automate-compliance-checks-with-aws-audit-manager-2f8n | 0 | 2 | null | 2023-04-26T17:50:41Z | null | null | 2 | https://dev.to/aws-builders/how-to-automate-compliance-checks-with-aws-audit-manager-2f8n | 2023-04-26T17:50:41Z | 2023-04-26T20:56:20Z | null | 2023-04-26T17:50:41Z | 2023-04-26T17:50:41Z | 5 | ['aws', 'cloudaudit', 'infosec'] | aws, cloudaudit, infosec | {'name': 'Wilklins Nyatteng', 'username': 'wilklins', 'twitter_username': 'wilklins__', 'github_username': 'WILKLINS', 'user_id': 1037358, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup... | {'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae... | null | 561,834 | ||
article | 1,449,230 | WebLogic Deserialization Vulnerability - CVE-2023-21839 | Introduction WebLogic is an application server produced by Oracle Corporation in the... | Apr 26 '23 | weblogic-deserialization-vulnerability-cve-2023-21839-4ed6 | /tutorialboy/weblogic-deserialization-vulnerability-cve-2023-21839-4ed6 | https://dev.to/tutorialboy/weblogic-deserialization-vulnerability-cve-2023-21839-4ed6 | 0 | 1 | null | 2023-04-26T20:17:32Z | null | null | 1 | https://dev.to/tutorialboy/weblogic-deserialization-vulnerability-cve-2023-21839-4ed6 | 2023-04-26T20:17:33Z | 2023-04-26T20:19:41Z | null | 2023-04-26T20:17:32Z | 2023-04-26T20:17:32Z | 3 | ['cybersecurity', 'infosec', 'cve'] | cybersecurity, infosec, cve | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,835 | ||
article | 1,406,324 | Secret handling in modern cloud-scale enterprise applications | Can the experts here please help me understand how secrets (certs, keys, etc) are managed and... | Mar 19 '23 | secret-handling-in-modern-cloud-scale-enterprise-applications-1732 | /security_dreamer/secret-handling-in-modern-cloud-scale-enterprise-applications-1732 | https://dev.to/security_dreamer/secret-handling-in-modern-cloud-scale-enterprise-applications-1732 | 0 | 0 | null | 2023-03-19T03:45:25Z | null | null | 0 | null | https://dev.to/security_dreamer/secret-handling-in-modern-cloud-scale-enterprise-applications-1732 | 2023-03-19T03:45:26Z | null | null | 2023-03-19T03:45:25Z | 2023-03-19T03:45:25Z | 1 | ['security', 'cicd', 'secrets', 'infosec'] | security, cicd, secrets, infosec | {'name': 'Security_Dreamer', 'username': 'security_dreamer', 'twitter_username': 'mektare', 'github_username': None, 'user_id': 1047932, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo... | null | null | 561,836 | |
article | 1,394,793 | The InfoSec Essential Guide to Vulnerability Management | Vulnerability management refers to the identification, classification, prioritization, and... | Mar 9 '23 | the-infosec-essential-guide-to-vulnerability-management-5g9f | /yayabobi/the-infosec-essential-guide-to-vulnerability-management-5g9f | https://dev.to/yayabobi/the-infosec-essential-guide-to-vulnerability-management-5g9f | 0 | 0 | null | 2023-03-09T18:25:57Z | en | null | 0 | null | https://cybeready.com/category/the-infosec-essential-guide-to-vulnerability-management | 2023-03-09T18:25:58Z | null | null | 2023-03-09T18:25:57Z | 2023-03-09T18:25:57Z | 10 | ['infosec', 'cybersecurity'] | infosec, cybersecurity | {'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro... | null | null | 561,837 | |
article | 1,399,650 | PSA: A NEW SCAM TARGETING TECH FOUNDERS | Teams of Scammers are impersonating Investors to steal your identity as well as your ideas. | Mar 13 '23 | psa-a-new-scam-targeting-tech-founders-1bfa | /glind/psa-a-new-scam-targeting-tech-founders-1bfa | https://dev.to/glind/psa-a-new-scam-targeting-tech-founders-1bfa | 1 | 0 | null | 2023-03-13T23:01:42Z | en | null | 0 | null | https://dev.to/glind/psa-a-new-scam-targeting-tech-founders-1bfa | 2023-03-13T23:01:42Z | 2023-03-13T23:04:24Z | null | 2023-03-13T23:01:42Z | 2023-12-22T18:52:50Z | 2 | ['investors', 'scams', 'infosec', 'security'] | investors, scams, infosec, security | {'name': 'Greg Lind', 'username': 'glind', 'twitter_username': 'glind', 'github_username': 'glind', 'user_id': 98051, 'website_url': 'http://www.buildly.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo... | null | null | 561,838 | |
article | 1,347,861 | Have you integrated CrowdSec into your XSOAR platform yet?🔓 | ✅Avoid background noise from the Internet 👉 Reduce the volume of alerts. ✅Have more oversight and... | Jan 31 '23 | have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5 | /olispt/have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5 | https://dev.to/olispt/have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5 | 0 | 0 | null | 2023-01-31T09:26:49Z | en | null | 0 | null | https://dev.to/olispt/have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5 | 2023-01-31T09:26:49Z | 2023-01-31T10:54:34Z | null | 2023-01-31T09:26:49Z | 2023-01-31T09:26:49Z | 1 | ['threatintelligence', 'infosec', 'opensource', 'security'] | threatintelligence, infosec, opensource, security | {'name': 'Oli SPT', 'username': 'olispt', 'twitter_username': 'busioli', 'github_username': None, 'user_id': 1014105, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofil... | null | null | 561,839 | |
article | 1,384,191 | The Alarming Rise of Social Engineering Attacks in the Financial Sector | Gone are the days of masks and guns for bank and financial institutions robberies. Criminals have... | Mar 1 '23 | the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector-2kb0 | /sennovate/the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector-2kb0 | https://dev.to/sennovate/the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector-2kb0 | 0 | 0 | null | 2023-03-01T18:15:57Z | en | null | 0 | https://sennovate.com/the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector/ | 2023-03-01T18:15:57Z | null | null | 2023-03-01T18:15:57Z | 2023-03-01T18:15:57Z | 1 | ['cybersecurity', 'security', 'infosec', 'beginners'] | cybersecurity, security, infosec, beginners | {'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | null | null | 561,840 | ||
article | 1,341,066 | How I obtained my CISSP | Intro The Certified Information Systems Security Professional or CISSP is known for its... | Jan 25 '23 | how-i-obtained-my-cissp-hhe | /terraier/how-i-obtained-my-cissp-hhe | https://dev.to/terraier/how-i-obtained-my-cissp-hhe | 0 | 2 | null | 2023-01-25T18:15:48Z | en | null | 2 | https://www.toul.io/how-i-got-my-cissp/ | 2023-01-25T18:15:48Z | 2023-02-18T17:58:46Z | null | 2023-01-25T18:15:48Z | 2023-01-25T18:15:48Z | 4 | ['cybersecurity', 'career', 'infosec', 'security'] | cybersecurity, career, infosec, security | {'name': 'Toul', 'username': 'terraier', 'twitter_username': None, 'github_username': 'Peter-Lankton', 'user_id': 590046, 'website_url': 'https://cranecybersecurityconsulting.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.... | null | null | 561,841 | ||
article | 1,339,605 | The Real-World Impacts of Social Engineering | What Is Social Engineering? Social engineering is a type of attack that takes place due to human... | Jan 24 '23 | the-real-world-impacts-of-social-engineering-42pb | /sennovate/the-real-world-impacts-of-social-engineering-42pb | https://dev.to/sennovate/the-real-world-impacts-of-social-engineering-42pb | 0 | 0 | null | 2023-01-24T12:47:33Z | en | null | 0 | https://sennovate.com/the-real-world-impacts-of-social-engineering/ | 2023-01-24T12:47:34Z | 2023-02-09T08:53:49Z | null | 2023-01-24T12:47:33Z | 2023-01-24T12:47:33Z | 6 | ['cybersecurity', 'security', 'infosec', 'beginners'] | cybersecurity, security, infosec, beginners | {'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | null | null | 561,842 | ||
article | 1,281,968 | 10 years in the InfoSec industry | Ten years ago, in December 2012, I have officially started my career in the (Information) Security... | Dec 6 '22 | 10-years-in-the-infosec-industry-1efh | /dorneanu/10-years-in-the-infosec-industry-1efh | https://dev.to/dorneanu/10-years-in-the-infosec-industry-1efh | 0 | 0 | null | 2022-12-06T07:34:26Z | en | null | 0 | null | https://blog.dornea.nu/2022/12/02/10-years-in-the-infosec-industry/ | 2022-12-02T16:20:45Z | null | 2022-12-06T07:34:26Z | 2022-12-02T13:36:00Z | 2022-12-02T13:36:00Z | 6 | ['security', 'cloud', 'learning', 'infosec'] | security, cloud, learning, infosec | {'name': 'Victor Dorneanu', 'username': 'dorneanu', 'twitter_username': 'victordorneanu', 'github_username': 'dorneanu', 'user_id': 284490, 'website_url': 'https://blog.dornea.nu', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.... | null | null | 561,843 | |
article | 1,258,632 | A Brief Introduction to SAML Security Vector | SAML started in 2001, and the final SAML 2.0 version was released in 2005. Since then, no major... | Nov 16 '22 | a-brief-introduction-to-saml-security-vector-11hf | /tutorialboy/a-brief-introduction-to-saml-security-vector-11hf | https://dev.to/tutorialboy/a-brief-introduction-to-saml-security-vector-11hf | 0 | 8 | null | 2022-11-16T04:56:45Z | en | null | 8 | null | https://tutorialboy24.blogspot.com/2022/11/a-brief-introduction-to-saml-security.html | 2022-11-16T04:52:23Z | 2022-11-16T04:57:05Z | 2022-11-16T04:56:45Z | 2022-11-16T02:10:00Z | 2022-11-16T02:10:00Z | 29 | ['saml', 'bugbounty', 'cybersecurity', 'infosec'] | saml, bugbounty, cybersecurity, infosec | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,844 | |
article | 1,246,600 | A Beginner’s Guide to Understanding & Recognizing Different Cyber Threats | With technology being so ever-evolving, it also presents a whole bucket of snakes to many users and... | Nov 7 '22 | a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn | /chelmerrox/a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn | https://dev.to/chelmerrox/a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn | 0 | 4 | null | 2022-11-07T15:25:36Z | en | null | 4 | https://dev.to/chelmerrox/a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn | 2022-11-07T14:01:10Z | 2022-11-08T04:43:10Z | null | 2022-11-07T15:25:36Z | 2022-11-07T15:25:36Z | 5 | ['beginners', 'cybersecurity', 'infosec', 'informationsecurity'] | beginners, cybersecurity, infosec, informationsecurity | {'name': 'Losalini Rokocakau', 'username': 'chelmerrox', 'twitter_username': None, 'github_username': 'chelmerrox', 'user_id': 967002, 'website_url': 'https://github.com/chelmerrox', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload... | null | null | 561,845 | ||
article | 1,246,173 | Mastodon Verification Post | You can find my profile here => Mastodon Have a great day! | Nov 7 '22 | mastodon-verification-post-2ci5 | /wandering-geek/mastodon-verification-post-2ci5 | https://dev.to/wandering-geek/mastodon-verification-post-2ci5 | 0 | 0 | null | 2022-11-07T07:19:35Z | en | null | 0 | null | https://dev.to/wandering-geek/mastodon-verification-post-2ci5 | 2022-11-07T07:19:35Z | 2024-01-09T09:06:17Z | null | 2022-11-07T07:19:35Z | 2022-11-07T07:19:35Z | 1 | ['security', 'mastodon', 'infosec'] | security, mastodon, infosec | {'name': 'Krishna', 'username': 'wandering-geek', 'twitter_username': None, 'github_username': 'wanderingeek', 'user_id': 190497, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fu... | null | null | 561,846 | |
article | 1,234,480 | Android Security : A Checklist For Exploiting WebView | Source :-... | Oct 29 '22 | android-security-a-checklist-for-exploiting-webview-5379 | /tutorialboy/android-security-a-checklist-for-exploiting-webview-5379 | https://dev.to/tutorialboy/android-security-a-checklist-for-exploiting-webview-5379 | 0 | 2 | 20,299 | 2022-10-29T06:57:00Z | en | null | 2 | https://tutorialboy24.blogspot.com/2022/10/android-security-checklist-for.html | 2022-10-28T19:05:33Z | null | null | 2022-10-29T06:57:00Z | 2022-10-29T06:57:00Z | 11 | ['cybersecurity', 'infosec', 'android', 'informationsecurity'] | cybersecurity, infosec, android, informationsecurity | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,847 | ||
article | 1,234,497 | Spring Actuator - Finding Actuators using Static Code Analysis - Part 2 | In the first part of this series, we have discussed the risks inherent in exposing the Actuator... | Oct 29 '22 | spring-actuator-finding-actuators-using-static-code-analysis-part-2-4ijo | /tutorialboy/spring-actuator-finding-actuators-using-static-code-analysis-part-2-4ijo | https://dev.to/tutorialboy/spring-actuator-finding-actuators-using-static-code-analysis-part-2-4ijo | 0 | 1 | 20,295 | 2022-10-29T02:00:00Z | en | null | 1 | https://tutorialboy24.blogspot.com/2022/10/spring-actuator-finding-actuators-using.html | 2022-10-28T19:49:26Z | null | null | 2022-10-29T02:00:00Z | 2022-10-29T02:00:00Z | 10 | ['cybersecurity', 'infosec', 'security', 'informationsecurity'] | cybersecurity, infosec, security, informationsecurity | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,848 | ||
article | 1,234,486 | Spring Actuator - Stealing Secrets Using Spring Actuators - Part 1: | Spring is a set of frameworks for developing Applications in Java. It is widely used, and so it is... | Oct 28 '22 | spring-actuator-stealing-secrets-using-spring-actuators-part-1-4o2a | /tutorialboy/spring-actuator-stealing-secrets-using-spring-actuators-part-1-4o2a | https://dev.to/tutorialboy/spring-actuator-stealing-secrets-using-spring-actuators-part-1-4o2a | 0 | 1 | 20,295 | 2022-10-28T20:19:00Z | en | null | 1 | https://tutorialboy24.blogspot.com/2022/09/spring-actuator-stealing-secrets-using.html | 2022-10-28T19:19:51Z | null | null | 2022-10-28T20:19:00Z | 2022-10-28T20:19:00Z | 9 | ['cybersecurity', 'infosec', 'springboot', 'informationsecurity'] | cybersecurity, infosec, springboot, informationsecurity | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,849 | ||
article | 1,234,476 | A Remote Code Execution in JXPath Library (CVE-2022-41852) | Source :- https://tutorialboy24.blogspot.com/2022/10/a-remote-code-execution-in-jxpath.html On... | Oct 28 '22 | a-remote-code-execution-in-jxpath-library-cve-2022-41852-253d | /tutorialboy/a-remote-code-execution-in-jxpath-library-cve-2022-41852-253d | https://dev.to/tutorialboy/a-remote-code-execution-in-jxpath-library-cve-2022-41852-253d | 0 | 2 | 20,294 | 2022-10-28T18:47:09Z | en | null | 2 | https://tutorialboy24.blogspot.com/2022/10/a-remote-code-execution-in-jxpath.html | 2022-10-28T18:47:09Z | 2022-10-28T19:02:32Z | null | 2022-10-28T18:47:09Z | 2022-10-28T18:47:09Z | 4 | ['cybersecurity', 'java', 'infosec', 'informationsecurity'] | cybersecurity, java, infosec, informationsecurity | {'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde... | null | null | 561,850 | ||
article | 1,220,126 | 🪄 Grype jq tricks : csv for spreadsheets 📊 | ❔ About Often, when you talk about an image vulnerabilities, you need to get that kind of... | Oct 18 '22 | grype-jq-tricks-csv-for-spreadsheets-c7h | /optnc/grype-jq-tricks-csv-for-spreadsheets-c7h | https://dev.to/optnc/grype-jq-tricks-csv-for-spreadsheets-c7h | 4 | 5 | 18,947 | 2022-10-18T19:38:03Z | en | null | 5 | https://dev.to/optnc/grype-jq-tricks-csv-for-spreadsheets-c7h | 2022-10-14T22:21:45Z | 2022-10-19T11:23:32Z | null | 2022-10-18T19:38:03Z | 2022-10-19T11:22:41Z | 1 | ['docker', 'security', 'devops', 'infosec'] | docker, security, devops, infosec | {'name': 'adriens', 'username': 'adriens', 'twitter_username': 'rastadidi', 'github_username': 'adriens', 'user_id': 446871, 'website_url': 'https://www.linkedin.com/in/adrien-sales/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uplo... | {'name': 'opt-nc', 'username': 'optnc', 'slug': 'optnc', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5458%2F98dc3bfe-45f7-48c6-a182-21944edf46b6.jpg', 'profile_image... | null | 561,851 | ||
article | 1,214,157 | Logging in, a thing we all hate | We've all seen this one, right? "As a user, I want to log in to the app." That's a lie. And not... | Oct 8 '22 | logging-in-a-thing-we-all-hate-504d | /isaacdlyman/logging-in-a-thing-we-all-hate-504d | https://dev.to/isaacdlyman/logging-in-a-thing-we-all-hate-504d | 3 | 25 | null | 2022-10-08T14:09:45Z | en | null | 25 | null | https://dev.to/isaacdlyman/logging-in-a-thing-we-all-hate-504d | 2022-10-08T04:47:39Z | null | null | 2022-10-08T14:09:45Z | 2023-09-12T16:29:45Z | 11 | ['infosec', 'security', 'ux'] | infosec, security, ux | {'name': 'Isaac Lyman', 'username': 'isaacdlyman', 'twitter_username': None, 'github_username': 'isaaclyman', 'user_id': 572, 'website_url': 'http://isaaclyman.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.co... | null | null | 561,852 | |
article | 1,181,672 | Blue Team Conference | Hey all! It's been a minute, to say the least. As I took on a new role as a Cloud security engineer... | Sep 16 '22 | blue-team-conference-dn8 | /pauld/blue-team-conference-dn8 | https://dev.to/pauld/blue-team-conference-dn8 | 0 | 3 | null | 2022-09-16T18:27:40Z | en | null | 3 | https://dev.to/pauld/blue-team-conference-dn8 | 2022-09-01T17:25:01Z | 2022-09-16T18:29:04Z | null | 2022-09-16T18:27:40Z | 2022-09-16T18:27:40Z | 2 | ['blueteam', 'infosec', 'security'] | blueteam, infosec, security | {'name': 'Paul', 'username': 'pauld', 'twitter_username': 'Arconopalous623', 'github_username': None, 'user_id': 152883, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro... | null | null | 561,853 | ||
article | 1,186,516 | Reconmap 2.0.0 release notes | (Photo by NASA on Unsplash) Here we are again with another release notes for our vulnerability... | Sep 6 '22 | reconmap-200-release-notes-45o8 | /netfoe/reconmap-200-release-notes-45o8 | https://dev.to/netfoe/reconmap-200-release-notes-45o8 | 0 | 0 | null | 2022-09-06T21:03:18Z | en | null | 0 | https://dev.to/netfoe/reconmap-200-release-notes-45o8 | 2022-09-06T21:03:18Z | null | null | 2022-09-06T21:03:18Z | 2022-09-06T21:03:18Z | 2 | ['security', 'opensource', 'pentesting', 'infosec'] | security, opensource, pentesting, infosec | {'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload... | {'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima... | null | 561,854 | ||
article | 1,181,286 | Web Pentesting Learning - Beginner edition | After a couple of years of learning on my own, I created a brief list of the assets I think were most... | Sep 1 '22 | web-pentesting-learning-beginner-edition-4clg | /theagilemonkeys/web-pentesting-learning-beginner-edition-4clg | https://dev.to/theagilemonkeys/web-pentesting-learning-beginner-edition-4clg | 0 | 10 | null | 2022-09-01T09:37:07Z | en | null | 10 | null | https://dev.to/theagilemonkeys/web-pentesting-learning-beginner-edition-4clg | 2022-09-01T09:34:55Z | null | null | 2022-09-01T09:37:07Z | 2022-09-01T09:37:07Z | 3 | ['pentesting', 'security', 'infosec'] | pentesting, security, infosec | {'name': 'J2RGEZ', 'username': 'j2rguez', 'twitter_username': 'J2RGUEZ', 'github_username': None, 'user_id': 9785, 'website_url': 'https://github.com/juanjoman', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2F... | {'name': 'The Agile Monkeys', 'username': 'theagilemonkeys', 'slug': 'theagilemonkeys', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F645%2F69ecc7e6-e64b-4230-928e-564... | null | 561,855 | |
article | 1,155,384 | On the hook of a phisher | Phishing campaigns are standard, but they are typically poorly done and low-effort. But, sometimes,... | Nov 4 '22 | on-the-hook-of-a-phisher-1f6b | /jpdias/on-the-hook-of-a-phisher-1f6b | https://dev.to/jpdias/on-the-hook-of-a-phisher-1f6b | 0 | 1 | null | 2022-11-04T22:35:02Z | en | null | 1 | null | https://jpdias.me/infosec/2022/07/30/phishing-story.html | 2022-07-30T13:20:06Z | null | 2022-11-04T22:35:02Z | 2022-07-30T00:00:00Z | 2022-07-30T00:00:00Z | 9 | ['infosec', 'phishing', 'security'] | infosec, phishing, security | {'name': 'JP Dias', 'username': 'jpdias', 'twitter_username': None, 'github_username': 'jpdias', 'user_id': 3886, 'website_url': 'https://jpdias.me', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fus... | null | null | 561,856 | |
article | 1,079,292 | Reconmap 1.5.0 release notes | We are excited to share release notes for Reconmap 1.5.0, immediately available on Github. Version... | May 8 '22 | reconmap-150-release-notes-1agi | /netfoe/reconmap-150-release-notes-1agi | https://dev.to/netfoe/reconmap-150-release-notes-1agi | 0 | 3 | null | 2022-05-08T19:12:59Z | null | null | 3 | null | https://dev.to/netfoe/reconmap-150-release-notes-1agi | 2022-05-08T19:12:59Z | 2022-05-08T19:25:53Z | null | 2022-05-08T19:12:59Z | 2022-05-08T19:12:59Z | 2 | ['security', 'mssp', 'infosec', 'pentesting'] | security, mssp, infosec, pentesting | {'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload... | {'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima... | null | 561,857 | |
article | 1,075,764 | 🗞️ Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ? | 🛡️ About Java 18 is out since a few weeks. Let's see how we can handle its integration... | May 5 '22 | java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g | /optnc/java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g | https://dev.to/optnc/java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g | 1 | 3 | 18,376 | 2022-05-05T01:57:41Z | null | null | 3 | https://dev.to/optnc/java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g | 2022-05-04T22:55:47Z | 2022-06-23T20:42:46Z | null | 2022-05-05T01:57:41Z | 2022-05-26T21:56:52Z | 1 | ['docker', 'java', 'infosec', 'devops'] | docker, java, infosec, devops | {'name': 'adriens', 'username': 'adriens', 'twitter_username': 'rastadidi', 'github_username': 'adriens', 'user_id': 446871, 'website_url': 'https://www.linkedin.com/in/adrien-sales/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uplo... | {'name': 'opt-nc', 'username': 'optnc', 'slug': 'optnc', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5458%2F98dc3bfe-45f7-48c6-a182-21944edf46b6.jpg', 'profile_image... | null | 561,858 | ||
article | 1,044,297 | ¿Por qué no debo reutilizar mi contraseña? | En una nota anterior anterior, explicamos cómo la crisis sanitaria del momento ha acelerado la... | Apr 4 '22 | test-4f3g | /shazer/test-4f3g | https://dev.to/shazer/test-4f3g | 0 | 3 | null | 2022-04-04T15:16:47Z | null | null | 3 | null | https://sh4z3r.gitbook.io/blog/blog-spanish/por-que-no-debo-reutilizar-mi-contrasena | 2022-04-04T15:16:47Z | 2022-04-04T15:29:08Z | null | 2022-04-04T15:16:47Z | 2022-04-04T15:16:47Z | 2 | ['informationsecurity', 'infosec', 'spanish'] | informationsecurity, infosec, spanish | {'name': 'Shazer', 'username': 'shazer', 'twitter_username': 'ShazerTech', 'github_username': 'sh4z3r', 'user_id': 841877, 'website_url': 'https://sh4z3r.github.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.co... | null | null | 561,859 | |
article | 1,038,617 | Simulating a Phishing Attack Against Your Company | Spoiler: This is a post about defending against phishing attacks, not a guide for engaging as an... | Mar 30 '22 | simulating-a-phishing-attack-against-your-company-5b3g | /theaccordance/simulating-a-phishing-attack-against-your-company-5b3g | https://dev.to/theaccordance/simulating-a-phishing-attack-against-your-company-5b3g | 0 | 5 | null | 2022-03-30T00:35:29Z | null | null | 5 | https://dev.to/theaccordance/simulating-a-phishing-attack-against-your-company-5b3g | 2022-03-30T00:10:29Z | null | null | 2022-03-30T00:35:29Z | 2022-03-30T00:35:29Z | 3 | ['infosec', 'security'] | infosec, security | {'name': 'Joe Mainwaring', 'username': 'theaccordance', 'twitter_username': None, 'github_username': 'theaccordance', 'user_id': 58970, 'website_url': 'http://mainwaring.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.am... | null | null | 561,860 | ||
article | 1,037,383 | Where all DEVs fail in Security | Intro I have been in security for several years. My work is to test an application or an... | Mar 28 '22 | where-all-devs-fail-in-security-360b | /fand0mas/where-all-devs-fail-in-security-360b | https://dev.to/fand0mas/where-all-devs-fail-in-security-360b | 0 | 6 | null | 2022-03-28T21:34:49Z | null | null | 6 | null | https://dev.to/fand0mas/where-all-devs-fail-in-security-360b | 2022-03-28T21:34:49Z | 2022-03-29T13:36:55Z | null | 2022-03-28T21:34:49Z | 2022-03-28T21:34:49Z | 2 | ['infosec', 'webdev', 'programming', 'backend'] | infosec, webdev, programming, backend | {'name': 'Theodoros Danos', 'username': 'fand0mas', 'twitter_username': 'fand0mas', 'github_username': None, 'user_id': 668832, 'website_url': 'https://blog.cybervelia.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amaz... | null | null | 561,861 | |
article | 1,009,494 | Reconmap 1.1.0 release notes | Although we haven't been publishing a lot of articles on this website, work hasn't stopped on the... | Mar 4 '22 | reconmap-110-release-notes-35b8 | /netfoe/reconmap-110-release-notes-35b8 | https://dev.to/netfoe/reconmap-110-release-notes-35b8 | 0 | 5 | null | 2022-03-04T14:43:16Z | null | null | 5 | https://dev.to/netfoe/reconmap-110-release-notes-35b8 | 2022-03-04T14:43:16Z | 2022-03-04T14:46:01Z | null | 2022-03-04T14:43:16Z | 2022-03-04T14:43:16Z | 2 | ['vulnerability', 'pentesting', 'infosec', 'opensource'] | vulnerability, pentesting, infosec, opensource | {'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload... | {'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima... | null | 561,862 | ||
article | 983,577 | Data Breach: a 5 Steps Response Plan | A data breach is one of the worst scenarios in today’s enterprise security. What’s your plan to remediate this kind of situation, minimize the impact, and ensure business continuity? Although there is no such thing as a one-size-fits-all tactic, the following steps are crucial to a positive outcome. | Feb 9 '22 | data-breach-a-5-steps-response-plan-ejg | /gitguardian/data-breach-a-5-steps-response-plan-ejg | https://dev.to/gitguardian/data-breach-a-5-steps-response-plan-ejg | 0 | 2 | null | 2022-02-09T10:48:31Z | null | null | 2 | https://dev.to/gitguardian/data-breach-a-5-steps-response-plan-ejg | 2022-02-09T10:43:47Z | 2022-02-15T08:08:36Z | null | 2022-02-09T10:48:31Z | 2022-02-09T10:48:31Z | 7 | ['databreach', 'cybersecurity', 'pentesting', 'infosec'] | databreach, cybersecurity, pentesting, infosec | {'name': 'David Balaban', 'username': 'davidbalaban', 'twitter_username': 'PrivacyPC', 'github_username': None, 'user_id': 815226, 'website_url': 'https://macsecurity.net', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazo... | {'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png... | null | 561,863 | ||
article | 954,994 | Should we target zero false positives? | While scanning millions of documents for secrets, should we really aim at reaching absolute zero or is the story not so simple? | Jan 14 '22 | should-we-target-zero-false-positives-4kij | /gitguardian/should-we-target-zero-false-positives-4kij | https://dev.to/gitguardian/should-we-target-zero-false-positives-4kij | 0 | 0 | null | 2022-01-14T09:42:36Z | null | null | 0 | null | https://blog.gitguardian.com/should-we-target-zero-false-positives/ | 2022-01-14T09:39:33Z | 2022-03-18T09:17:50Z | null | 2022-01-14T09:42:36Z | 2022-01-14T09:42:36Z | 5 | ['sast', 'infosec', 'appsec', 'datascience'] | sast, infosec, appsec, datascience | {'name': 'Aurélien Gâteau', 'username': 'agateaugg', 'twitter_username': None, 'github_username': 'agateau-gg', 'user_id': 793690, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2F... | {'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png... | null | 561,864 | |
article | 841,558 | Handing over the keys to your digital kingdom to a Digital Agency | Every few years, either being forced by procurement rules or due to deteriorating relationships,... | Nov 26 '21 | handing-over-the-keys-to-your-digital-kingdom-to-a-digital-agency-2f7k | /sylvainreiter/handing-over-the-keys-to-your-digital-kingdom-to-a-digital-agency-2f7k | https://dev.to/sylvainreiter/handing-over-the-keys-to-your-digital-kingdom-to-a-digital-agency-2f7k | 0 | 0 | null | 2021-11-26T11:32:34Z | en | null | 0 | null | https://theuxcto.com/digital-blitz/handing-over-the-keys-to-your-digital-kingdom/ | 2021-09-26T22:46:55Z | null | 2021-11-26T11:32:34Z | 2021-09-26T19:29:31Z | 2021-09-26T19:29:31Z | 3 | ['digitalagency', 'devops', 'infosec'] | digitalagency, devops, infosec | {'name': 'Sylvain Reiter / The UX CTO', 'username': 'sylvainreiter', 'twitter_username': 'sylvainreiter', 'github_username': None, 'user_id': 552484, 'website_url': 'https://theuxcto.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to... | null | null | 561,865 | |
article | 904,958 | Horrifying Vulnerabilities in the Death/Birth Certificate System | Premise: Death and birth certificates can be filed online, with practically no oversight. DefCon... | Nov 23 '21 | horrifying-vulnerabilities-in-the-deathbirth-certificate-system-11mn | /scriptautomate/horrifying-vulnerabilities-in-the-deathbirth-certificate-system-11mn | https://dev.to/scriptautomate/horrifying-vulnerabilities-in-the-deathbirth-certificate-system-11mn | 0 | 4 | 15,640 | 2021-11-23T04:46:38Z | null | null | 4 | https://icanteven.io/notes/VqxOhUXlNJaQ0jVq3LwsN/ | 2021-11-21T21:21:27Z | 2021-11-23T05:10:43Z | null | 2021-11-23T04:46:38Z | 2021-11-23T04:46:38Z | 2 | ['security', 'infosec', 'defcon', 'cybersecurity'] | security, infosec, defcon, cybersecurity | {'name': 'Derek Ardolf', 'username': 'scriptautomate', 'twitter_username': None, 'github_username': 'ScriptAutomate', 'user_id': 220952, 'website_url': 'https://icanteven.xyz', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.a... | null | null | 561,866 | ||
article | 904,961 | When IoT Attacks: Hacking a Linux-Powered Rifle | Premise: Let's place a computer on a gun, and give it WiFi. DefCon Response: Let's hijack it, and... | Nov 21 '21 | when-iot-attacks-hacking-a-linux-powered-rifle-4b0j | /scriptautomate/when-iot-attacks-hacking-a-linux-powered-rifle-4b0j | https://dev.to/scriptautomate/when-iot-attacks-hacking-a-linux-powered-rifle-4b0j | 0 | 1 | 15,640 | 2021-11-21T21:33:45Z | null | null | 1 | https://icanteven.io/notes/6wrzp9vxpgj6lhllbm2gh/ | 2021-11-21T21:31:34Z | 2021-11-23T05:11:03Z | null | 2021-11-21T21:33:45Z | 2021-11-21T21:33:45Z | 2 | ['security', 'infosec', 'defcon'] | security, infosec, defcon | {'name': 'Derek Ardolf', 'username': 'scriptautomate', 'twitter_username': None, 'github_username': 'ScriptAutomate', 'user_id': 220952, 'website_url': 'https://icanteven.xyz', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.a... | null | null | 561,867 | ||
article | 842,543 | A Checklist to Quickly Evaluate SaaS Security | You don't need extensive infosec reviews to gauge the relative maturity of a SaaS company's security. You just need their website. | Sep 27 '21 | a-checklist-to-quickly-evaluate-saas-security-3hj3 | /zmre/a-checklist-to-quickly-evaluate-saas-security-3hj3 | https://dev.to/zmre/a-checklist-to-quickly-evaluate-saas-security-3hj3 | 0 | 3 | null | 2021-09-27T17:31:08Z | en | null | 3 | https://ironcorelabs.com/blog/2021/checklist-fast-evaluation-of-saas-security/ | 2021-09-27T17:31:08Z | null | null | 2021-09-27T17:31:08Z | 2021-09-27T17:31:08Z | 4 | ['saas', 'security', 'infosec', 'evaluation'] | saas, security, infosec, evaluation | {'name': 'Patrick Walsh', 'username': 'zmre', 'twitter_username': 'zmre', 'github_username': None, 'user_id': 150090, 'website_url': 'https://ironcorelabs.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu... | null | null | 561,868 | ||
article | 824,032 | API Security 101: Improper Assets Management | And why missing documentation is a vulnerability. Photo by Martin Adams on... | Oct 19 '21 | api-security-101-improper-assets-management-n8h | /shiftleft/api-security-101-improper-assets-management-n8h | https://dev.to/shiftleft/api-security-101-improper-assets-management-n8h | 0 | 1 | null | 2021-10-19T22:53:30Z | en | null | 1 | null | https://blog.shiftleft.io/api-security-101-improper-assets-management-825bfe9ea0b4 | 2021-09-14T18:53:01Z | 2021-10-19T22:53:35Z | 2021-10-19T22:53:30Z | 2021-09-14T14:33:12Z | 2021-09-14T14:33:12Z | 3 | ['api', 'infosec', 'softwareengineering', 'cybersecurity'] | api, infosec, softwareengineering, cybersecurity | {'name': 'Cdebrincat', 'username': 'cdebrincat', 'twitter_username': None, 'github_username': 'Cdebrincat', 'user_id': 664390, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser... | {'name': 'ShiftLeft', 'username': 'shiftleft', 'slug': 'shiftleft', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3959%2Fd97d599b-5c90-4961-8582-5822bad94624.jpg', 'pr... | null | 561,869 | |
article | 829,912 | Top 5 Can’t-Miss Cybersecurity Awareness Tips | Don't let your organization fall victim to a cybersecurity attack. Stay ahead of cyberattacks before... | Sep 17 '21 | top-5-can-t-miss-cybersecurity-awareness-tips-3jb1 | /yayabobi/top-5-can-t-miss-cybersecurity-awareness-tips-3jb1 | https://dev.to/yayabobi/top-5-can-t-miss-cybersecurity-awareness-tips-3jb1 | 0 | 1 | null | 2021-09-17T19:04:59Z | en | null | 1 | null | https://dev.to/yayabobi/top-5-can-t-miss-cybersecurity-awareness-tips-3jb1 | 2021-09-17T19:04:59Z | 2021-09-17T19:05:28Z | null | 2021-09-17T19:04:59Z | 2021-09-17T19:04:59Z | 3 | ['cybersecurity', 'infosec'] | cybersecurity, infosec | {'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro... | null | null | 561,870 | |
article | 829,386 | How to list Azure VM potentially affected by the OMI RCE | There is Remote Code Execution (RCE) vulnerability in the Open Management Infrastructure (OMI)... | Sep 17 '21 | how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9 | /omiossec/how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9 | https://dev.to/omiossec/how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9 | 1 | 4 | null | 2021-09-17T10:36:08Z | en | null | 4 | null | https://dev.to/omiossec/how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9 | 2021-09-17T09:42:19Z | 2021-09-22T04:47:38Z | null | 2021-09-17T10:36:08Z | 2021-09-21T13:51:34Z | 1 | ['azure', 'infosec', 'security', 'omi'] | azure, infosec, security, omi | {'name': 'Olivier Miossec', 'username': 'omiossec', 'twitter_username': 'omiossec_med', 'github_username': 'omiossec', 'user_id': 160244, 'website_url': 'https://github.com/omiossec', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploa... | null | null | 561,871 | |
article | 828,547 | AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple | AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make... | Sep 16 '21 | azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2 | /azure/azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2 | https://dev.to/azure/azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2 | 0 | 6 | null | 2021-09-16T19:17:34Z | en | null | 6 | https://dev.to/azure/azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2 | 2021-09-16T19:17:34Z | 2021-09-21T14:40:20Z | null | 2021-09-16T19:17:34Z | 2021-09-16T19:17:34Z | 4 | ['infosec', 'security', 'azure', 'cloud'] | infosec, security, azure, cloud | {'name': 'Jay Gordon', 'username': 'jaydestro', 'twitter_username': 'jaydestro', 'github_username': 'jaydestro', 'user_id': 26924, 'website_url': 'https://azure.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c... | {'name': 'Microsoft Azure', 'username': 'azure', 'slug': 'azure', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F512%2F64ce0b82-730d-4ca0-8359-2c21513a0063.jpg', 'profi... | null | 561,872 | ||
article | 818,834 | AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas | AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make... | Sep 9 '21 | azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode | /azure/azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode | https://dev.to/azure/azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode | 0 | 8 | null | 2021-09-09T19:10:57Z | en | null | 8 | https://dev.to/azure/azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode | 2021-09-09T16:43:12Z | 2021-09-09T19:12:39Z | null | 2021-09-09T19:10:57Z | 2021-09-09T19:10:57Z | 3 | ['security', 'infosec', 'azure', 'serverless'] | security, infosec, azure, serverless | {'name': 'Jay Gordon', 'username': 'jaydestro', 'twitter_username': 'jaydestro', 'github_username': 'jaydestro', 'user_id': 26924, 'website_url': 'https://azure.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c... | {'name': 'Microsoft Azure', 'username': 'azure', 'slug': 'azure', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F512%2F64ce0b82-730d-4ca0-8359-2c21513a0063.jpg', 'profi... | null | 561,873 | ||
article | 817,565 | AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021 | AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make... | Sep 8 '21 | azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb | /azure/azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb | https://dev.to/azure/azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb | 0 | 7 | null | 2021-09-08T14:11:16Z | en | null | 7 | https://dev.to/azure/azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb | 2021-09-08T14:11:16Z | null | null | 2021-09-08T14:11:16Z | 2021-09-08T14:11:16Z | 3 | ['infosec', 'security', 'azure', 'serverless'] | infosec, security, azure, serverless | {'name': 'Jay Gordon', 'username': 'jaydestro', 'twitter_username': 'jaydestro', 'github_username': 'jaydestro', 'user_id': 26924, 'website_url': 'https://azure.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c... | {'name': 'Microsoft Azure', 'username': 'azure', 'slug': 'azure', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F512%2F64ce0b82-730d-4ca0-8359-2c21513a0063.jpg', 'profi... | null | 561,874 | ||
article | 745,157 | A (not so) Gentle Intro to Active Directory: ØxOPOSɆC [0xF09F8EA3] Challenge | Yet another month, yet another ØxOPOSɆC meetup. This is a write-up on the 0xF09F8EA3 edition... | Nov 4 '22 | a-not-so-gentle-intro-to-active-directory-oxoposc-0xf09f8ea3-challenge-5878 | /jpdias/a-not-so-gentle-intro-to-active-directory-oxoposc-0xf09f8ea3-challenge-5878 | https://dev.to/jpdias/a-not-so-gentle-intro-to-active-directory-oxoposc-0xf09f8ea3-challenge-5878 | 0 | 0 | null | 2022-11-04T22:36:07Z | en | null | 0 | null | https://jpdias.me/infosec/writeup/2021/06/30/intro-to-ad-challenge.html | 2021-07-01T15:20:42Z | null | 2022-11-04T22:36:07Z | 2021-06-30T00:00:00Z | 2021-06-30T00:00:00Z | 11 | ['activedirectory', 'oposec', 'infosec', 'writeup'] | activedirectory, oposec, infosec, writeup | {'name': 'JP Dias', 'username': 'jpdias', 'twitter_username': None, 'github_username': 'jpdias', 'user_id': 3886, 'website_url': 'https://jpdias.me', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fus... | null | null | 561,875 | |
article | 776,832 | TryHackMe Ignite Room Walkthrough | https://tryhackme.com/room/ignite A new start-up has a few issues with their web server. ... | Jul 30 '21 | tryhackme-ignite-room-walkthrough-5672 | /wandering-geek/tryhackme-ignite-room-walkthrough-5672 | https://dev.to/wandering-geek/tryhackme-ignite-room-walkthrough-5672 | 0 | 0 | 13,897 | 2021-07-30T17:25:56Z | en | null | 0 | null | https://dev.to/wandering-geek/tryhackme-ignite-room-walkthrough-5672 | 2021-07-30T16:56:58Z | 2021-08-07T09:13:40Z | null | 2021-07-30T17:25:56Z | 2021-07-30T17:25:56Z | 6 | ['beginners', 'security', 'infosec'] | beginners, security, infosec | {'name': 'Krishna', 'username': 'wandering-geek', 'twitter_username': None, 'github_username': 'wanderingeek', 'user_id': 190497, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fu... | null | null | 561,876 | |
article | 641,817 | When a crisis occurs - Panic | Another week rolls on by and it has been quite eventful. Managed to have my first COVID jab, so now... | Mar 22 '21 | ports-open-everywhere-12jj | /testingtheeventhorizon/ports-open-everywhere-12jj | https://dev.to/testingtheeventhorizon/ports-open-everywhere-12jj | 0 | 0 | null | 2021-03-22T07:37:43Z | en | null | 0 | https://dev.to/testingtheeventhorizon/ports-open-everywhere-12jj | 2021-03-22T07:05:58Z | 2021-03-22T07:38:17Z | null | 2021-03-22T07:37:43Z | 2021-03-22T07:37:43Z | 6 | ['todayilearned', 'infosec', 'devjournal', 'security'] | todayilearned, infosec, devjournal, security | {'name': 'Steveland', 'username': 'testingtheeventhorizon', 'twitter_username': None, 'github_username': 'decosta', 'user_id': 221401, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fupload... | null | {'name': 'todayilearned', 'bg_color_hex': '#ffedc9', 'text_color_hex': '#820000'} | 561,877 | ||
article | 671,735 | A practical guide to writing secure Dockerfiles | Photo by Ishant Mishra on Unsplash Tools, techniques, and procedures to write secure... | Aug 24 '22 | a-practical-guide-to-writing-secure-dockerfiles-2kgg | /madhuakula/a-practical-guide-to-writing-secure-dockerfiles-2kgg | https://dev.to/madhuakula/a-practical-guide-to-writing-secure-dockerfiles-2kgg | 0 | 8 | null | 2022-08-24T00:49:50Z | en | null | 8 | null | https://medium.com/miro-engineering/a-practical-guide-to-writing-secure-dockerfiles-bf561224dd80 | 2021-04-19T16:29:02Z | null | 2022-08-24T00:49:50Z | 2021-04-19T12:32:01Z | 2021-04-19T12:32:01Z | 12 | ['miro', 'devops', 'infosec', 'security'] | miro, devops, infosec, security | {'name': 'Madhu Akula', 'username': 'madhuakula', 'twitter_username': None, 'github_username': 'madhuakula', 'user_id': 166767, 'website_url': 'https://madhuakula.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws... | null | null | 561,878 | |
article | 649,732 | To Secure Today’s Code, It’s Time to Shift Left | The threat landscape is constantly evolving, and today’s DevOps professionals are under more pressure... | Mar 30 '21 | to-secure-today-s-code-it-s-time-to-shift-left-4pdl | /advocatemack/to-secure-today-s-code-it-s-time-to-shift-left-4pdl | https://dev.to/advocatemack/to-secure-today-s-code-it-s-time-to-shift-left-4pdl | 0 | 10 | null | 2021-03-30T06:39:08Z | en | null | 10 | https://dev.to/advocatemack/to-secure-today-s-code-it-s-time-to-shift-left-4pdl | 2021-03-30T06:39:08Z | null | null | 2021-03-30T06:39:08Z | 2021-03-30T06:39:08Z | 6 | ['cybersecurity', 'appsec', 'security', 'infosec'] | cybersecurity, appsec, security, infosec | {'name': 'Mackenzie ', 'username': 'advocatemack', 'twitter_username': 'advocatemack', 'github_username': 'mackenziejj', 'user_id': 355398, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu... | null | null | 561,880 | ||
article | 643,723 | Writeup: HackTheBox Netmon- Without Metasploit (OSCP Prep) | To start, yes I misspelled *Netmon in my kali machine lol. Please don't come for me. Now onto the B... | Mar 25 '21 | writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1 | /xyzchris0/writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1 | https://dev.to/xyzchris0/writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1 | 0 | 0 | null | 2021-03-25T19:51:37Z | en | null | 0 | https://dev.to/xyzchris0/writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1 | 2021-03-24T00:13:25Z | 2021-03-29T12:05:38Z | null | 2021-03-25T19:51:37Z | 2021-03-25T19:51:37Z | 9 | ['cybersecurity', 'hackthebox', 'webdev', 'infosec'] | cybersecurity, hackthebox, webdev, infosec | {'name': 'Chris', 'username': 'xyzchris0', 'twitter_username': None, 'github_username': '0xHuey', 'user_id': 382144, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile... | null | null | 561,881 | ||
article | 617,243 | When should my startup prioritize infosec? | If you imagine your organization as a sea-faring vessel, infosec’s goal is to ensure the boat can su... | Feb 24 '21 | when-should-my-startup-prioritize-infosec-10e8 | /goldfiglabs/when-should-my-startup-prioritize-infosec-10e8 | https://dev.to/goldfiglabs/when-should-my-startup-prioritize-infosec-10e8 | 0 | 2 | null | 2021-02-24T20:04:34Z | en | null | 2 | null | https://blog.goldfiglabs.com/2021/02/23/when-should-my.html | 2021-02-24T20:03:47Z | null | null | 2021-02-24T20:04:34Z | 2021-02-24T20:04:34Z | 3 | ['infosec', 'secops', 'cloud', 'security'] | infosec, secops, cloud, security | {'name': 'Gold Fig Labs', 'username': 'goldfiglabs', 'twitter_username': 'goldfiglabs', 'github_username': None, 'user_id': 577844, 'website_url': 'https://goldfiglabs.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amaz... | null | null | 561,882 | |
article | 548,027 | O que a série You pode te ensinar sobre segurança digital | (Atenção: Este texto pode conter spoilers da primeira temporada de “You”) Neste texto eu... | Dec 16 '21 | o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77 | /guiteixeira/o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77 | https://dev.to/guiteixeira/o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77 | 0 | 0 | null | 2021-12-16T22:12:43Z | pt | null | 0 | null | https://dev.to/guiteixeira/o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77 | 2020-12-20T21:36:34Z | 2021-12-17T01:41:24Z | 2021-12-16T22:12:43Z | 2020-12-20T21:34:56Z | 2020-12-20T21:34:56Z | 18 | ['cybersecurity', 'infosec', 'sec'] | cybersecurity, infosec, sec | {'name': 'Guilherme Teixeira ', 'username': 'guiteixeira', 'twitter_username': None, 'github_username': 'ggteixeira', 'user_id': 278991, 'website_url': 'https://guiteixeira.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3... | null | null | 561,883 | |
article | 529,067 | Illustrated Notes on Web Security Essentials | Illustrated notes all about the essentials of web security | Nov 30 '20 | illustrated-notes-on-web-security-essentials-3ob7 | /egghead/illustrated-notes-on-web-security-essentials-3ob7 | https://dev.to/egghead/illustrated-notes-on-web-security-essentials-3ob7 | 1 | 20 | null | 2020-11-30T18:03:02Z | en | null | 20 | https://dev.to/egghead/illustrated-notes-on-web-security-essentials-3ob7 | 2020-11-30T17:45:04Z | 2020-11-30T18:05:03Z | null | 2020-11-30T18:03:02Z | 2020-12-01T07:36:15Z | 2 | ['security', 'infosec'] | security, infosec | {'name': 'Maggie Appleton', 'username': 'maggieappleton', 'twitter_username': None, 'github_username': 'MaggieAppleton', 'user_id': 111641, 'website_url': 'http://maggieappleton.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uplo... | {'name': 'egghead.io', 'username': 'egghead', 'slug': 'egghead', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F481%2Fa9cbe1bb-1763-4fa5-957f-a7578933cd22.png', 'profil... | null | 561,884 | ||
article | 482,550 | Security Benchmarking at 1300 °C | Hot, Hotter, Magma Molten or semi-molten natural material that all igneous rocks are made... | Oct 9 '20 | security-benchmarking-at-1300-c-1e0b | /duplys/security-benchmarking-at-1300-c-1e0b | https://dev.to/duplys/security-benchmarking-at-1300-c-1e0b | 0 | 5 | null | 2020-10-09T20:36:22Z | en | null | 5 | https://dev.to/duplys/security-benchmarking-at-1300-c-1e0b | 2020-10-09T20:31:18Z | 2020-10-11T14:47:55Z | null | 2020-10-09T20:36:22Z | 2020-10-09T20:36:22Z | 5 | ['infosec', 'fuzzing', 'vulnerability', 'magma'] | infosec, fuzzing, vulnerability, magma | {'name': 'Paul Duplys', 'username': 'duplys', 'twitter_username': 'duplys', 'github_username': 'duplys', 'user_id': 393784, 'website_url': 'http://duplys.github.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c... | null | null | 561,885 | ||
article | 480,462 | Pentesting Android Apps Using "Frida and Objection" | We are doing free training on "Pentesting Android Apps Using Frida and Objection" on 17th October. If... | Oct 7 '20 | pentesting-android-apps-using-frida-and-objection-1oi | /rahulvenati/pentesting-android-apps-using-frida-and-objection-1oi | https://dev.to/rahulvenati/pentesting-android-apps-using-frida-and-objection-1oi | 1 | 3 | null | 2020-10-07T16:05:17Z | en | null | 3 | null | https://dev.to/rahulvenati/pentesting-android-apps-using-frida-and-objection-1oi | 2020-10-07T16:05:17Z | 2020-10-07T16:05:53Z | null | 2020-10-07T16:05:17Z | 2020-10-07T16:07:06Z | 1 | ['android', 'pentesting', 'infosec', 'security'] | android, pentesting, infosec, security | {'name': 'Rahul Venati', 'username': 'rahulvenati', 'twitter_username': 'rahulvenati', 'github_username': None, 'user_id': 439919, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2F... | null | null | 561,886 | |
article | 472,378 | Generating pentest reports with Reconmap | Let's be honest, pentesters do what they do because they are hackers (in the purest meaning of the wo... | Oct 2 '20 | generating-pentest-reports-with-reconmap-4fj6 | /netfoe/generating-pentest-reports-with-reconmap-4fj6 | https://dev.to/netfoe/generating-pentest-reports-with-reconmap-4fj6 | 0 | 6 | 9,058 | 2020-10-02T16:06:32Z | en | null | 6 | http://blog.reconmap.org/post/generating-pentest-reports-with-reconmap | 2020-10-02T16:06:32Z | 2021-03-19T07:52:58Z | null | 2020-10-02T16:06:32Z | 2020-10-02T16:06:32Z | 3 | ['security', 'pentesting', 'infosec', 'vulnerability'] | security, pentesting, infosec, vulnerability | {'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload... | {'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima... | null | 561,887 | ||
article | 405,244 | Information Gathering with "theHarvester" | This is the first tool in the Red Team Tools series that I will be talking to you today. In this... | Jul 20 '20 | information-gathering-with-theharvester-58l3 | /tropyl/information-gathering-with-theharvester-58l3 | https://dev.to/tropyl/information-gathering-with-theharvester-58l3 | 0 | 13 | 7,878 | 2020-07-20T16:22:22Z | en | null | 13 | https://tropyl.com/information-gathering-with-theharvester-ckcuotdsm008i7os1gtwyfxjv | 2020-07-20T16:22:22Z | 2020-07-20T16:22:51Z | null | 2020-07-20T16:22:22Z | 2020-07-20T16:22:22Z | 9 | ['security', 'pentest', 'redteamtools', 'infosec'] | security, pentest, redteamtools, infosec | {'name': 'sumanbasuli', 'username': 'sumanbasuli', 'twitter_username': 'TxSadhu', 'github_username': 'TxSadhu', 'user_id': 206688, 'website_url': 'https://tropyl.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.... | {'name': 'Tropyl', 'username': 'tropyl', 'slug': 'tropyl', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1816%2Ffaded488-7759-4c2f-bd7b-c3af7df6aa34.png', 'profile_ima... | null | 561,888 | ||
article | 371,253 | Day-11: Read Info-sec Write-Ups! | Day-11: Did Unix badge exercise on Pentesterlab and was not in the mood to do research so did read so... | Jun 27 '20 | day-11-read-info-sec-write-ups-3cd1 | /th3lazykid/day-11-read-info-sec-write-ups-3cd1 | https://dev.to/th3lazykid/day-11-read-info-sec-write-ups-3cd1 | 1 | 6 | null | 2020-06-27T17:20:28Z | null | null | 6 | https://dev.to/th3lazykid/day-11-read-info-sec-write-ups-3cd1 | 2020-06-27T14:42:19Z | 2020-06-27T17:30:33Z | null | 2020-06-27T17:20:28Z | 2023-11-19T04:46:35Z | 1 | ['cybersecurity', 'security', 'blogaday', 'infosec'] | cybersecurity, security, blogaday, infosec | {'name': 'FENIL SHAH', 'username': 'th3lazykid', 'twitter_username': 'FenilShah1616', 'github_username': 'Th3lazykid', 'user_id': 316764, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fupl... | null | null | 561,889 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.