type_of
stringclasses
1 value
id
int64
12
2.31M
title
stringlengths
1
256
description
stringlengths
1
3.47k
readable_publish_date
stringlengths
5
10
slug
stringlengths
2
308
path
stringlengths
9
316
url
stringlengths
23
330
comments_count
int64
-3
1.19k
public_reactions_count
int64
-82
4.01k
collection_id
float64
60
30.7k
published_timestamp
stringlengths
20
20
language
stringclasses
95 values
subforem_id
float64
1
1
positive_reactions_count
int64
-82
4.01k
cover_image
stringlengths
61
544
social_image
stringlengths
61
544
canonical_url
stringlengths
15
452
created_at
stringlengths
20
20
edited_at
stringlengths
20
20
crossposted_at
stringlengths
20
20
published_at
stringlengths
20
20
last_comment_at
stringlengths
20
20
reading_time_minutes
int64
0
279
tag_list
stringlengths
5
121
tags
stringlengths
1
111
user
stringlengths
509
758
organization
stringlengths
501
629
flare_tag
stringclasses
13 values
__index_level_0__
int64
0
722k
article
2,006,585
# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero
Disclaimer This post is for educational and informational purposes only. The methods...
Sep 20 '24
-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3
/be11amer/-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3
https://dev.to/be11amer/-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3
0
0
null
2024-09-20T18:29:11Z
en
null
0
https://media2.dev.to/dy…awygqzy7h7su.png
https://media2.dev.to/dy…awygqzy7h7su.png
https://dev.to/be11amer/-exploring-the-risks-of-rfid-wifi-tags-copying-and-emulating-with-a-flipper-zero-46k3
2024-09-19T10:46:09Z
null
null
2024-09-20T18:29:11Z
2024-09-20T18:29:11Z
5
['cybersecurity', 'infosec', 'wifi', 'testing']
cybersecurity, infosec, wifi, testing
{'name': 'Bellamer', 'username': 'be11amer', 'twitter_username': 'Be11amer', 'github_username': None, 'user_id': 1919087, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpr...
null
null
561,788
article
2,004,665
What are ITDR in cyber security?
ITDR stands for Identity Threat Detection and Response. It is a security practice and framework...
Sep 18 '24
what-are-itdr-in-cyber-security-28b8
/turingvangisms/what-are-itdr-in-cyber-security-28b8
https://dev.to/turingvangisms/what-are-itdr-in-cyber-security-28b8
0
0
null
2024-09-18T04:15:19Z
en
null
0
null
https://media2.dev.to/dy…es6vksj0bp86.png
https://dev.to/turingvangisms/what-are-itdr-in-cyber-security-28b8
2024-09-18T04:15:19Z
null
null
2024-09-18T04:15:19Z
2024-09-18T04:15:19Z
1
['itdr', 'cyber', 'security', 'infosec']
itdr, cyber, security, infosec
{'name': 'Turing', 'username': 'turingvangisms', 'twitter_username': 'TuringVangISMS', 'github_username': None, 'user_id': 2087125, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2...
null
null
561,789
article
2,014,133
Unified Kill Chain
Understanding the Unified Kill Chain: Strengthening Cybersecurity Against Threats In...
Sep 25 '24
unified-kill-chain-p0f
/codacblack/unified-kill-chain-p0f
https://dev.to/codacblack/unified-kill-chain-p0f
0
0
null
2024-09-25T09:20:49Z
en
null
0
https://media2.dev.to/dy…uy8nzy5lbohm.png
https://media2.dev.to/dy…uy8nzy5lbohm.png
https://dev.to/codacblack/unified-kill-chain-p0f
2024-09-25T09:20:12Z
null
null
2024-09-25T09:20:49Z
2024-09-25T09:20:49Z
3
['security', 'cybersecurity', 'infosec']
security, cybersecurity, infosec
{'name': 'codac-black', 'username': 'codacblack', 'twitter_username': None, 'github_username': 'codac-black', 'user_id': 2123789, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fu...
null
null
561,790
article
2,036,452
API Security: Threats, Tools, and Best Practices
What Is API Security? API security refers to the practices and protocols that are used to...
Oct 13 '24
api-security-threats-tools-and-best-practices-2hl5
/pynt/api-security-threats-tools-and-best-practices-2hl5
https://dev.to/pynt/api-security-threats-tools-and-best-practices-2hl5
0
5
null
2024-10-13T12:33:43Z
en
null
5
https://media2.dev.to/dy…aw01jf8fve2o.png
https://media2.dev.to/dy…aw01jf8fve2o.png
https://dev.to/pynt/api-security-threats-tools-and-best-practices-2hl5
2024-10-13T12:33:44Z
2024-11-07T09:38:48Z
null
2024-10-13T12:33:43Z
2024-10-13T12:33:43Z
1
['appsec', 'infosec', 'owasp', 'api']
appsec, infosec, owasp, api
{'name': 'Pynt.io', 'username': 'pynt', 'twitter_username': None, 'github_username': None, 'user_id': 2205391, 'website_url': 'https://www.pynt.io?ref=dev.to', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup...
null
null
561,791
article
2,032,853
Supply Chain Risk Management Strategy with Sennovate
In the digital ecosystem of today, supply chain security is no longer a secondary concern, but a...
Oct 10 '24
supply-chain-risk-management-strategy-with-sennovate-2163
/sennovate/supply-chain-risk-management-strategy-with-sennovate-2163
https://dev.to/sennovate/supply-chain-risk-management-strategy-with-sennovate-2163
0
1
null
2024-10-10T08:52:58Z
en
null
1
https://media2.dev.to/dy…tsyakmpt9cqf.png
https://media2.dev.to/dy…tsyakmpt9cqf.png
https://dev.to/sennovate/supply-chain-risk-management-strategy-with-sennovate-2163
2024-10-10T08:52:59Z
null
null
2024-10-10T08:52:58Z
2024-10-10T08:52:58Z
4
['cybersecurity', 'zerotrust', 'security', 'infosec']
cybersecurity, zerotrust, security, infosec
{'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
null
null
561,792
article
2,014,122
How Does WAF Prevent OS Command Injection Attacks
OS command injection is a type of security vulnerability that allows an attacker to execute arbitrary...
Sep 25 '24
how-does-waf-prevent-os-command-injection-attacks-1cbo
/carrie_luo1/how-does-waf-prevent-os-command-injection-attacks-1cbo
https://dev.to/carrie_luo1/how-does-waf-prevent-os-command-injection-attacks-1cbo
0
2
null
2024-09-25T09:13:31Z
en
null
2
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/carrie_luo1/how-does-waf-prevent-os-command-injection-attacks-1cbo
2024-09-25T09:13:31Z
2024-09-25T11:02:24Z
null
2024-09-25T09:13:31Z
2024-09-25T09:13:31Z
5
['cybersecurity', 'infosec', 'webdev', 'security']
cybersecurity, infosec, webdev, security
{'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon...
null
null
561,793
article
2,014,044
How Does WAF Prevent XSS Attacks
Cross-Site Scripting (XSS) attacks are a type of security vulnerability found in web applications...
Sep 25 '24
how-does-waf-prevent-xss-attacks-3768
/carrie_luo1/how-does-waf-prevent-xss-attacks-3768
https://dev.to/carrie_luo1/how-does-waf-prevent-xss-attacks-3768
0
3
null
2024-09-25T08:01:17Z
en
null
3
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/carrie_luo1/how-does-waf-prevent-xss-attacks-3768
2024-09-25T08:01:18Z
null
null
2024-09-25T08:01:17Z
2024-09-25T08:01:17Z
5
['cybersecurity', 'infosec']
cybersecurity, infosec
{'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon...
null
null
561,794
article
2,012,466
Top 5 Website Data Leakage Events 2024
1. MOVEit: The MOVEit Managed File Transfer application suffered a massive data breach impacting...
Sep 24 '24
top-5-website-data-leakage-events-2024-ed7
/carrie_luo1/top-5-website-data-leakage-events-2024-ed7
https://dev.to/carrie_luo1/top-5-website-data-leakage-events-2024-ed7
0
2
null
2024-09-24T09:50:17Z
en
null
2
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/carrie_luo1/top-5-website-data-leakage-events-2024-ed7
2024-09-24T09:50:18Z
2024-09-24T09:51:10Z
null
2024-09-24T09:50:17Z
2024-09-24T09:50:17Z
2
['cybersecurity', 'infosec']
cybersecurity, infosec
{'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon...
null
null
561,795
article
2,007,590
Why You Need to Protect Your Website and How
Protecting your website is crucial for several reasons, including safeguarding sensitive information,...
Sep 20 '24
why-you-need-to-protect-your-website-and-how-59cp
/carrie_luo1/why-you-need-to-protect-your-website-and-how-59cp
https://dev.to/carrie_luo1/why-you-need-to-protect-your-website-and-how-59cp
0
6
null
2024-09-20T06:28:07Z
en
null
6
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/carrie_luo1/why-you-need-to-protect-your-website-and-how-59cp
2024-09-20T06:28:08Z
null
null
2024-09-20T06:28:07Z
2024-09-20T06:28:07Z
3
['webdev', 'cybersecurity', 'infosec']
webdev, cybersecurity, infosec
{'name': 'Carrie', 'username': 'carrie_luo1', 'twitter_username': 'Carrie_Luo1', 'github_username': None, 'user_id': 2050794, 'website_url': 'https://discord.gg/CXTnVcYk', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazon...
null
null
561,796
article
1,939,711
Why the Crowdstrike Incident is NOT Solely Crowdstrike’s Fault
In the past week, the cybersecurity community has been abuzz with news of an incident involving...
Jul 29 '24
why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4
/sennovate/why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4
https://dev.to/sennovate/why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4
0
0
null
2024-07-29T08:38:09Z
en
null
0
https://media2.dev.to/dy…aoqxbor2eesb.png
https://media2.dev.to/dy…aoqxbor2eesb.png
https://dev.to/sennovate/why-the-crowdstrike-incident-is-not-solely-crowdstrikes-fault-58h4
2024-07-29T08:38:10Z
2024-07-29T08:40:55Z
null
2024-07-29T08:38:09Z
2024-07-29T08:38:09Z
3
['crowdstrike', 'cybersecurity', 'security', 'infosec']
crowdstrike, cybersecurity, security, infosec
{'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
null
null
561,797
article
1,928,776
Common SOC Challenges and How to Overcome Them
Security Operations Centers (SOCs) play a crucial role in identifying and remediating cybersecurity...
Jul 19 '24
common-soc-challenges-and-how-to-overcome-them-2bcd
/sennovate/common-soc-challenges-and-how-to-overcome-them-2bcd
https://dev.to/sennovate/common-soc-challenges-and-how-to-overcome-them-2bcd
0
0
null
2024-07-19T09:15:46Z
en
null
0
https://media2.dev.to/dy…686ufuc3tcl2.png
https://media2.dev.to/dy…686ufuc3tcl2.png
https://dev.to/sennovate/common-soc-challenges-and-how-to-overcome-them-2bcd
2024-07-19T09:15:46Z
2024-07-19T09:16:20Z
null
2024-07-19T09:15:46Z
2024-07-19T09:15:46Z
4
['soc', 'security', 'cybersecurity', 'infosec']
soc, security, cybersecurity, infosec
{'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
null
null
561,798
article
1,961,243
Examining Data About the Linux System
As part of my journey in cybersecurity, I have learned about the complexity of Linux systems. Both...
Aug 16 '24
examining-data-about-the-linux-system-3g5c
/b3secur3/examining-data-about-the-linux-system-3g5c
https://dev.to/b3secur3/examining-data-about-the-linux-system-3g5c
2
0
null
2024-08-16T09:08:26Z
en
null
0
https://media2.dev.to/dy…ptc9sci8w90l.png
https://media2.dev.to/dy…ptc9sci8w90l.png
https://dev.to/b3secur3/examining-data-about-the-linux-system-3g5c
2024-08-16T09:08:27Z
null
null
2024-08-16T09:08:26Z
2024-08-16T10:25:18Z
2
['cybersecurity', 'linux', 'devops', 'infosec']
cybersecurity, linux, devops, infosec
{'name': 'Urah', 'username': 'b3secur3', 'twitter_username': None, 'github_username': None, 'user_id': 1935698, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_imag...
null
null
561,799
article
1,961,315
Starting Out in Cybersecurity: My Journey and First Steps
🚀 Introduction Embarking on a journey into cybersecurity can feel like stepping into an expansive,...
Aug 16 '24
starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8
/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8
https://dev.to/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8
0
2
null
2024-08-16T10:10:26Z
en
null
2
null
https://media2.dev.to/dy…g78wd267eguk.png
https://dev.to/b3secur3/starting-out-in-cybersecurity-my-journey-and-first-steps-4oj8
2024-08-16T10:10:26Z
2024-08-16T10:24:27Z
null
2024-08-16T10:10:26Z
2024-08-16T10:10:26Z
2
['cybersecurity', 'infosec', 'learningjourney', 'careeradvice']
cybersecurity, infosec, learningjourney, careeradvice
{'name': 'Urah', 'username': 'b3secur3', 'twitter_username': None, 'github_username': None, 'user_id': 1935698, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_imag...
null
null
561,800
article
1,954,857
[picoctf] Scan Surprise writeup
Title: Scan Surprise Author: Jeffery John Date: 8/10/2024 ...
Aug 10 '24
picoctfscan-surprise-2506
/zerogru/picoctfscan-surprise-2506
https://dev.to/zerogru/picoctfscan-surprise-2506
0
5
null
2024-08-10T21:17:30Z
en
null
5
null
https://media2.dev.to/dy…6lyouupx75i3.png
https://dev.to/zerogru/picoctfscan-surprise-2506
2024-08-10T21:17:30Z
2024-08-10T21:19:50Z
null
2024-08-10T21:17:30Z
2024-08-10T21:17:30Z
1
['security', 'hacker', 'infosec', 'linux']
security, hacker, infosec, linux
{'name': 'zerogru', 'username': 'zerogru', 'twitter_username': None, 'github_username': None, 'user_id': 1911735, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_im...
null
null
561,801
article
1,931,932
Credit Card Tokenization API
PCI Vault) is a vendor neutral, zero-knowledge, PCI DSS level 1 compliant environment. It is a SaaS...
Jul 22 '24
pci-vault-1o30
/creditcardtokenization/pci-vault-1o30
https://dev.to/creditcardtokenization/pci-vault-1o30
0
0
null
2024-07-22T13:56:12Z
en
null
0
https://media2.dev.to/dy…cp2180al1b8y.jpg
https://media2.dev.to/dy…cp2180al1b8y.jpg
https://dev.to/creditcardtokenization/pci-vault-1o30
2024-07-22T13:56:13Z
2024-07-22T14:08:24Z
null
2024-07-22T13:56:12Z
2024-07-22T13:56:12Z
1
['go', 'cybersecurity', 'infosec', 'aws']
go, cybersecurity, infosec, aws
{'name': 'PCI Vault', 'username': 'creditcardtokenization', 'twitter_username': None, 'github_username': None, 'user_id': 1820174, 'website_url': 'https://pcivault.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws...
null
null
561,802
article
1,910,328
Secure Your AS400 Systems with Sennovate’s Managed Detection and Response (MDR) Service
In the cyber threat landscape, protecting important business systems such as AS400 is critical....
Jul 3 '24
secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8
/sennovate/secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8
https://dev.to/sennovate/secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8
0
0
null
2024-07-03T15:14:28Z
en
null
0
https://media2.dev.to/dy…jplh3a2naizu.png
https://media2.dev.to/dy…jplh3a2naizu.png
https://dev.to/sennovate/secure-your-as400-systems-with-sennovates-managed-detection-and-response-mdr-service-43a8
2024-07-03T15:14:29Z
null
null
2024-07-03T15:14:28Z
2024-07-03T15:14:28Z
3
['cybersecurity', 'security', 'infosec', 'mdr']
cybersecurity, security, infosec, mdr
{'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
null
null
561,803
article
1,956,350
Why SafeLine Might Be the Best Free WAF
Verifying SafeLine’s Effectiveness: A Comprehensive Evaluation ...
Aug 12 '24
why-safeline-might-be-the-best-free-waf-23o7
/motorbuy6/why-safeline-might-be-the-best-free-waf-23o7
https://dev.to/motorbuy6/why-safeline-might-be-the-best-free-waf-23o7
0
1
null
2024-08-12T11:05:50Z
en
null
1
null
https://media2.dev.to/dy…nlp727y5exz7.png
https://dev.to/motorbuy6/why-safeline-might-be-the-best-free-waf-23o7
2024-08-12T11:05:51Z
2024-08-12T11:06:56Z
null
2024-08-12T11:05:50Z
2024-08-12T11:05:50Z
3
['cybersecurity', 'waf', 'infosec', 'opensource']
cybersecurity, waf, infosec, opensource
{'name': 'MotorBuy6', 'username': 'motorbuy6', 'twitter_username': None, 'github_username': None, 'user_id': 1733862, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofil...
null
null
561,804
article
1,952,957
Effortless Security: Protect Your Site with a Free Open-Source WAF
Hey friends! Today, I'm really excited to share an free WAF with you—the SafeLine Community Edition....
Aug 9 '24
effortless-security-protect-your-site-with-a-free-open-source-waf-28j6
/sherbertill6/effortless-security-protect-your-site-with-a-free-open-source-waf-28j6
https://dev.to/sherbertill6/effortless-security-protect-your-site-with-a-free-open-source-waf-28j6
0
5
null
2024-08-09T03:01:38Z
en
null
5
null
https://media2.dev.to/dy…r4mp4k04p8jh.png
https://dev.to/sherbertill6/effortless-security-protect-your-site-with-a-free-open-source-waf-28j6
2024-08-09T03:01:39Z
null
null
2024-08-09T03:01:38Z
2024-08-09T03:01:38Z
2
['opensource', 'cybersecurity', 'infosec', 'security']
opensource, cybersecurity, infosec, security
{'name': 'SherbertIll6', 'username': 'sherbertill6', 'twitter_username': None, 'github_username': None, 'user_id': 1733804, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2F...
null
null
561,805
article
1,918,615
Essential Frameworks, Standards, and Programs for Building a Robust Information Security Plan
Cybersecurity Standards
Jul 10 '24
essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo
/saramazal/essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo
https://dev.to/saramazal/essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo
0
1
null
2024-07-10T14:14:21Z
en
null
1
null
https://media2.dev.to/dy…su4bs55x8kt0.png
https://dev.to/saramazal/essential-frameworks-standards-and-programs-for-building-a-robust-information-security-plan-1jmo
2024-07-10T14:08:11Z
null
null
2024-07-10T14:14:21Z
2024-07-10T14:14:21Z
3
['cybersecurity', 'infosec', 'nist', 'ethicalhacking']
cybersecurity, infosec, nist, ethicalhacking
{'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona...
null
null
561,806
article
1,918,531
What Every Cyber Specialist Needs to Know About Computer Structure
Cybersecurity and Computer Structure
Jul 10 '24
what-every-cyber-specialist-needs-to-know-about-computer-structure-5100
/saramazal/what-every-cyber-specialist-needs-to-know-about-computer-structure-5100
https://dev.to/saramazal/what-every-cyber-specialist-needs-to-know-about-computer-structure-5100
0
1
null
2024-07-10T13:00:43Z
en
null
1
null
https://media2.dev.to/dy…p3magii0oopv.png
https://dev.to/saramazal/what-every-cyber-specialist-needs-to-know-about-computer-structure-5100
2024-07-10T12:59:28Z
null
null
2024-07-10T13:00:43Z
2024-07-10T13:00:43Z
2
['cybersecurity', 'computer', 'ethicalhacking', 'infosec']
cybersecurity, computer, ethicalhacking, infosec
{'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona...
null
null
561,807
article
1,918,285
Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity
exploitDB
Jul 10 '24
exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl
/saramazal/exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl
https://dev.to/saramazal/exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl
0
1
null
2024-07-10T09:03:42Z
en
null
1
null
https://media2.dev.to/dy…ee0sfworysyd.png
https://dev.to/saramazal/exploring-the-exploit-database-platform-a-vital-resource-for-cybersecurity-jbl
2024-07-10T09:02:59Z
2024-07-10T13:08:56Z
null
2024-07-10T09:03:42Z
2024-07-10T09:03:42Z
2
['cybersecurity', 'infosec', 'pentesting', 'webdev']
cybersecurity, infosec, pentesting, webdev
{'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona...
null
null
561,808
article
1,918,267
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity Professionals
Understanding the MITRE ATT&CK Platform: A Valuable Resource for Cybersecurity...
Jul 10 '24
understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6
/saramazal/understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6
https://dev.to/saramazal/understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6
0
0
null
2024-07-10T08:44:54Z
en
null
0
null
https://media2.dev.to/dy…fg3xcxy4v6jm.png
https://dev.to/saramazal/understanding-the-mitre-attck-platform-a-valuable-resource-for-cybersecurity-professionals-1nd6
2024-07-10T08:40:02Z
null
null
2024-07-10T08:44:54Z
2024-07-10T08:44:54Z
2
['mitreattack', 'infosec', 'redteam', 'cybersecurity']
mitreattack, infosec, redteam, cybersecurity
{'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona...
null
null
561,809
article
1,918,177
Understanding the Distinction Between Information Security and Cybersecurity
InfoSec & cyber
Jul 10 '24
understanding-the-distinction-between-information-security-and-cybersecurity-pn
/saramazal/understanding-the-distinction-between-information-security-and-cybersecurity-pn
https://dev.to/saramazal/understanding-the-distinction-between-information-security-and-cybersecurity-pn
0
0
null
2024-07-10T07:23:56Z
en
null
0
null
https://media2.dev.to/dy…who0ttoc5by8.png
https://dev.to/saramazal/understanding-the-distinction-between-information-security-and-cybersecurity-pn
2024-07-10T07:16:03Z
2024-07-10T13:09:49Z
null
2024-07-10T07:23:56Z
2024-07-10T07:23:56Z
2
['infosec', 'cybersecurity', 'webdev', 'appsec']
infosec, cybersecurity, webdev, appsec
{'name': 'maz4l', 'username': 'saramazal', 'twitter_username': None, 'github_username': 'saramazal', 'user_id': 457769, 'website_url': 'https://saramazal-pwa.glitch.me/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazona...
null
null
561,810
article
1,903,585
Explorando abordagens de análise na Engenharia reversa:
A Engenharia reversa é crucial para diversas aplicações, desde a detecção e mitigação de malware até...
Jun 28 '24
explorando-abordagens-de-analise-na-engenharia-reversa-54f8
/ocafeeoelefante/explorando-abordagens-de-analise-na-engenharia-reversa-54f8
https://dev.to/ocafeeoelefante/explorando-abordagens-de-analise-na-engenharia-reversa-54f8
2
41
null
2024-06-28T04:15:48Z
pt
null
41
null
https://media2.dev.to/dy…gm38df4gsrjt.png
https://dev.to/ocafeeoelefante/explorando-abordagens-de-analise-na-engenharia-reversa-54f8
2024-06-28T04:15:48Z
2024-06-28T04:28:57Z
null
2024-06-28T04:15:48Z
2024-09-08T03:55:55Z
4
['engenhariareversa', 'cybersecurity', 'reversing', 'infosec']
engenhariareversa, cybersecurity, reversing, infosec
{'name': 'Pamie.', 'username': 'ocafeeoelefante', 'twitter_username': 'ocafeeoelefante', 'github_username': None, 'user_id': 1467450, 'website_url': 'https://github.com/ocafeeoelefante', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-up...
null
null
561,811
article
1,889,542
Types of Computer Security Threats
From mobile banking to online shopping, from healthcare systems to smart devices, software...
Jun 15 '24
types-of-computer-security-threats-dc8
/jusufoski/types-of-computer-security-threats-dc8
https://dev.to/jusufoski/types-of-computer-security-threats-dc8
0
1
null
2024-06-15T12:40:26Z
en
null
1
https://media2.dev.to/dy…nb088wtednxb.jpg
https://media2.dev.to/dy…nb088wtednxb.jpg
https://infosafe24.com/posts/Types-of-Computer-Security-Threats
2024-06-15T12:38:15Z
null
null
2024-06-15T12:40:26Z
2024-06-15T12:40:26Z
8
['cybersecurity', 'infosec', 'security', 'informationsecurity']
cybersecurity, infosec, security, informationsecurity
{'name': 'Zeki', 'username': 'jusufoski', 'twitter_username': 'ctextit', 'github_username': None, 'user_id': 1475895, 'website_url': 'https://codeline24.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup...
null
null
561,812
article
1,833,202
The Open-Source Backdoor That Almost Compromised SSH
Researchers discovered a backdoor in the compression tools xz Utils versions 5.6.0 and 5.6.1,...
Apr 24 '24
the-open-source-backdoor-that-almost-compromised-ssh-2lcg
/gitguardian/the-open-source-backdoor-that-almost-compromised-ssh-2lcg
https://dev.to/gitguardian/the-open-source-backdoor-that-almost-compromised-ssh-2lcg
0
2
null
2024-04-24T15:45:38Z
en
null
2
https://media2.dev.to/dy…rzedhabpy3bt.png
https://media2.dev.to/dy…rzedhabpy3bt.png
https://blog.gitguardian.com/the-backdoor-that-almost-compromised-ssh-security/
2024-04-24T15:45:39Z
null
null
2024-04-24T15:45:38Z
2024-04-24T15:45:38Z
3
['security', 'infosec', 'opensource', 'github']
security, infosec, opensource, github
{'name': 'Thomas Segura', 'username': 'segudev', 'twitter_username': None, 'github_username': 'segudev', 'user_id': 141347, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2F...
{'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png...
null
561,813
article
1,770,713
5 Card Skimming Methods Every Infosec Pro Needs to Know
Cybercriminals are notoriously adept at evolving their strategies and tactics to defraud individuals...
Feb 24 '24
5-card-skimming-methods-every-infosec-pro-needs-to-know-1ige
/yayabobi/5-card-skimming-methods-every-infosec-pro-needs-to-know-1ige
https://dev.to/yayabobi/5-card-skimming-methods-every-infosec-pro-needs-to-know-1ige
0
0
null
2024-02-24T04:18:09Z
en
null
0
null
https://media2.dev.to/dy…5ulvq4pkycx2.png
https://www.memcyco.com/home/card-skimming-methods/
2024-02-24T04:18:10Z
null
null
2024-02-24T04:18:09Z
2024-02-24T04:18:09Z
6
['infosec', 'cybersecurity', 'webdev']
infosec, cybersecurity, webdev
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro...
null
null
561,814
article
1,778,521
A simple tip to find hidden gems in Shodan
Shodan is a well-known recon tool, but in larger scopes, it has so many results that it’s hard to...
Mar 3 '24
a-simple-tip-to-find-hidden-gems-in-shodan-2c92
/menna/a-simple-tip-to-find-hidden-gems-in-shodan-2c92
https://dev.to/menna/a-simple-tip-to-find-hidden-gems-in-shodan-2c92
0
0
null
2024-03-03T03:55:28Z
en
null
0
null
https://media2.dev.to/dy…czvn9nhur3fq.png
https://dev.to/menna/a-simple-tip-to-find-hidden-gems-in-shodan-2c92
2024-03-03T03:55:29Z
null
null
2024-03-03T03:55:28Z
2024-03-03T03:55:28Z
2
['security', 'infosec', 'cybersecurity']
security, infosec, cybersecurity
{'name': 'Bruno', 'username': 'menna', 'twitter_username': None, 'github_username': 'b-hermes', 'user_id': 1321114, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_...
null
null
561,815
article
1,787,738
What is PII?
Curious about what personally identifiable information (PII) is? PII is any information that can be...
Mar 12 '24
what-is-pii-699
/strongboxit/what-is-pii-699
https://dev.to/strongboxit/what-is-pii-699
0
1
null
2024-03-12T08:55:08Z
en
null
1
null
https://media2.dev.to/dy…i4scjol1e930.png
https://dev.to/strongboxit/what-is-pii-699
2024-03-12T08:51:37Z
null
null
2024-03-12T08:55:08Z
2024-03-12T08:55:08Z
1
['cybersecurity', 'pii', 'infosec', 'ai']
cybersecurity, pii, infosec, ai
{'name': 'StrongBox IT', 'username': 'strongboxit', 'twitter_username': None, 'github_username': None, 'user_id': 1204198, 'website_url': 'https://www.strongboxit.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaw...
null
null
561,816
article
1,717,074
Understanding the Twitter Hack of 2020: A Deep Dive
Understanding the Twitter Hack of 2020: A Deep Dive In July 2020, Twitter faced one of the...
Jan 4 '24
understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4
/nikitakoselev/understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4
https://dev.to/nikitakoselev/understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4
0
4
null
2024-01-04T12:59:58Z
en
null
4
https://media2.dev.to/dy…ln2hf3kxfzkd.png
https://media2.dev.to/dy…ln2hf3kxfzkd.png
https://dev.to/nikitakoselev/understanding-the-twitter-hack-of-2020-a-deep-dive-2cf4
2024-01-04T12:59:59Z
null
null
2024-01-04T12:59:58Z
2024-01-04T12:59:58Z
2
['twitterhack', 'cybersecurity', 'socialengineering', 'infosec']
twitterhack, cybersecurity, socialengineering, infosec
{'name': 'Nikita Koselev', 'username': 'nikitakoselev', 'twitter_username': 'NikitaKoselev', 'github_username': 'nikitakoselev', 'user_id': 178396, 'website_url': 'https://linkfree.io/nikitakoselev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2...
null
null
561,817
article
1,715,744
What is Infrastructure Security?
Infrastructure security is the protection of the various components that support the functionality of...
Jan 3 '24
what-is-infrastructure-security-34g3
/donesrom/what-is-infrastructure-security-34g3
https://dev.to/donesrom/what-is-infrastructure-security-34g3
4
4
null
2024-01-03T10:31:13Z
en
null
4
https://media2.dev.to/dy…1332h2kjqp2f.png
https://media2.dev.to/dy…1332h2kjqp2f.png
https://dev.to/donesrom/what-is-infrastructure-security-34g3
2024-01-03T10:31:14Z
2024-01-04T08:07:05Z
null
2024-01-03T10:31:13Z
2024-09-13T09:56:39Z
7
['security', 'infrastructuresecurity', 'cybersecurity', 'infosec']
security, infrastructuresecurity, cybersecurity, infosec
{'name': 'Donesrom', 'username': 'donesrom', 'twitter_username': None, 'github_username': 'Donesrom', 'user_id': 1032083, 'website_url': 'https://donesrom.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu...
null
null
561,818
article
1,676,042
Securing AWS Environments Against Ransomware
In today's increasingly interconnected world, organizations are turning to cloud platforms like...
Nov 23 '23
securing-aws-environments-against-ransomware-3a0d
/aws-builders/securing-aws-environments-against-ransomware-3a0d
https://dev.to/aws-builders/securing-aws-environments-against-ransomware-3a0d
0
2
null
2023-11-23T07:58:47Z
en
null
2
null
https://media2.dev.to/dy…g6zt3cdn0ktg.png
https://dev.to/aws-builders/securing-aws-environments-against-ransomware-3a0d
2023-11-23T07:58:48Z
null
null
2023-11-23T07:58:47Z
2023-11-23T07:58:47Z
3
['awssecurity', 'ransomware', 'infosec', 'cloudsecurity']
awssecurity, ransomware, infosec, cloudsecurity
{'name': 'Wilklins Nyatteng', 'username': 'wilklins', 'twitter_username': 'wilklins__', 'github_username': 'WILKLINS', 'user_id': 1037358, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup...
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae...
null
561,819
article
1,632,978
The InfoSec Guide to the Principles of Zero Trust
"Never trust, always verify." Sounds a little paranoid, doesn't it? But it's the key principle behind...
Oct 12 '23
the-infosec-guide-to-the-principles-of-zero-trust-3d1i
/yayabobi/the-infosec-guide-to-the-principles-of-zero-trust-3d1i
https://dev.to/yayabobi/the-infosec-guide-to-the-principles-of-zero-trust-3d1i
0
0
null
2023-10-12T18:15:55Z
en
null
0
null
https://media2.dev.to/dy…ayd3tnlvvbx2.png
https://cybeready.com/category/the-infosec-guide-to-the-principles-of-zero-trust
2023-10-12T18:15:55Z
null
null
2023-10-12T18:15:55Z
2023-10-12T18:15:55Z
12
['infosec', 'cybersecurity', 'zerotrus', 'devops']
infosec, cybersecurity, zerotrus, devops
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro...
null
null
561,820
article
1,667,146
Black Hat MEA 2023
🔒As RELIANOID are a excited cybersecurity professional team with a passion for staying at the...
Nov 15 '23
black-hat-mea-2023-54po
/relianoid/black-hat-mea-2023-54po
https://dev.to/relianoid/black-hat-mea-2023-54po
0
0
null
2023-11-15T08:54:43Z
en
null
0
null
https://media2.dev.to/dy…nf7x8srvqs6z.png
https://dev.to/relianoid/black-hat-mea-2023-54po
2023-11-15T08:54:43Z
2023-11-16T08:33:18Z
null
2023-11-15T08:54:43Z
2023-11-15T08:54:43Z
1
['cybersecurity', 'infosec', 'security', 'blackhat']
cybersecurity, infosec, security, blackhat
{'name': 'relianoid', 'username': 'relianoid', 'twitter_username': 'relianoid', 'github_username': None, 'user_id': 1159382, 'website_url': 'https://www.relianoid.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaw...
null
null
561,821
article
1,656,044
Data Integrity for the Lab: An Introduction
What you will learn if you follow this series (in no particular order) Concepts...
Nov 3 '23
lab-data-integrity-issue-1-j65
/cantum/lab-data-integrity-issue-1-j65
https://dev.to/cantum/lab-data-integrity-issue-1-j65
0
0
25,271
2023-11-03T17:59:02Z
en
null
0
null
https://media2.dev.to/dy…gax1bzyud66g.png
https://dev.to/cantum/lab-data-integrity-issue-1-j65
2023-11-03T15:01:43Z
2024-10-11T11:13:57Z
null
2023-11-03T17:59:02Z
2023-11-03T17:59:02Z
3
['lab', 'security', 'infosec', 'gamp']
lab, security, infosec, gamp
{'name': 'Michael Cantu', 'username': 'cantum', 'twitter_username': None, 'github_username': 'cantum-tech', 'user_id': 840012, 'website_url': 'https://hirocan.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com...
null
null
561,822
article
1,606,949
How will ISO/IEC 27001 benefit any organization?
ISO/IEC 27001:2022 is the latest version of the international standard for information security...
Sep 21 '23
how-will-isoiec-27001-benefit-my-organization-3gg7
/prachiarana/how-will-isoiec-27001-benefit-my-organization-3gg7
https://dev.to/prachiarana/how-will-isoiec-27001-benefit-my-organization-3gg7
0
0
null
2023-09-21T08:29:54Z
en
null
0
https://media2.dev.to/dy…gy8apk6cm6hs.jpg
https://media2.dev.to/dy…gy8apk6cm6hs.jpg
https://dev.to/prachiarana/how-will-isoiec-27001-benefit-my-organization-3gg7
2023-09-21T08:29:54Z
2023-09-21T08:35:41Z
null
2023-09-21T08:29:54Z
2023-09-21T08:29:54Z
2
['security', 'cybersecurity', 'informationsecurity', 'infosec']
security, cybersecurity, informationsecurity, infosec
{'name': 'Prachi Rana', 'username': 'prachiarana', 'twitter_username': None, 'github_username': None, 'user_id': 1166695, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpr...
null
null
561,823
article
1,579,819
Dado ou informação?
Dado e informação desempenham um papel extremamente importante na era atual. Atualmente vivemos em um...
Aug 25 '23
dado-ou-informacao-15f
/diegocorredeira/dado-ou-informacao-15f
https://dev.to/diegocorredeira/dado-ou-informacao-15f
0
0
null
2023-08-25T13:32:26Z
pt
null
0
null
https://media2.dev.to/dy…sczcqblftyw0.png
https://dev.to/diegocorredeira/dado-ou-informacao-15f
2023-08-25T13:32:26Z
2023-08-25T13:34:37Z
null
2023-08-25T13:32:26Z
2023-08-25T13:32:26Z
3
['infosec', 'beginners']
infosec, beginners
{'name': 'Diego', 'username': 'diegocorredeira', 'twitter_username': None, 'github_username': 'DiegoCorredeira', 'user_id': 1144868, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%...
null
null
561,824
article
1,593,799
Security: How to Discover Hidden API's
Unlock the secrets of API security! Don't miss our informative webinar hosted by True Positives,...
Sep 8 '23
security-how-to-discover-hidden-apis-5107
/brianpavicic/security-how-to-discover-hidden-apis-5107
https://dev.to/brianpavicic/security-how-to-discover-hidden-apis-5107
0
1
null
2023-09-08T15:29:42Z
en
null
1
https://media2.dev.to/dy…0gua2ienpj1b.png
https://media2.dev.to/dy…0gua2ienpj1b.png
https://dev.to/brianpavicic/security-how-to-discover-hidden-apis-5107
2023-09-08T15:29:43Z
null
null
2023-09-08T15:29:42Z
2023-09-08T15:29:42Z
1
['security', 'tooling', 'infosec', 'api']
security, tooling, infosec, api
{'name': 'Brian Pavicic', 'username': 'brianpavicic', 'twitter_username': 'TruePositives', 'github_username': None, 'user_id': 948291, 'website_url': 'https://www.true-positives.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploa...
null
null
561,825
article
1,593,091
Getting Started in Infosec
Encryption Fundamentals Understanding encryption is foundational for anyone diving into...
Sep 8 '23
getting-started-in-infosec-5fp3
/ghrake/getting-started-in-infosec-5fp3
https://dev.to/ghrake/getting-started-in-infosec-5fp3
0
1
null
2023-09-08T00:33:59Z
en
null
1
https://media2.dev.to/dy…n94ipklu2ab1.png
https://media2.dev.to/dy…n94ipklu2ab1.png
https://dev.to/ghrake/getting-started-in-infosec-5fp3
2023-09-08T00:34:00Z
null
null
2023-09-08T00:33:59Z
2023-09-08T00:33:59Z
3
['infosec', 'beginners', 'pentesting', 'ethicalhacking']
infosec, beginners, pentesting, ethicalhacking
{'name': 'Rake', 'username': 'ghrake', 'twitter_username': None, 'github_username': 'GH-Rake', 'user_id': 579933, 'website_url': 'https://guidedhacking.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo...
null
null
561,826
article
1,580,662
An Introduction for Developers to Information Security
Table of Content Introduction - Remembering the man who saved 17 million...
Aug 26 '23
information-security-4lhe
/mahdichaari01/information-security-4lhe
https://dev.to/mahdichaari01/information-security-4lhe
0
4
24,361
2023-08-26T12:50:37Z
en
null
4
https://media2.dev.to/dy…trmrjvfud1xk.jpg
https://media2.dev.to/dy…trmrjvfud1xk.jpg
https://dev.to/mahdichaari01/information-security-4lhe
2023-08-26T12:45:13Z
2023-08-27T16:06:58Z
null
2023-08-26T12:50:37Z
2023-08-26T12:50:37Z
6
['security', 'infosec', 'development', 'softwareengineering']
security, infosec, development, softwareengineering
{'name': 'Mahdi Chaari', 'username': 'mahdichaari01', 'twitter_username': None, 'github_username': 'mahdichaari01', 'user_id': 1039848, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploa...
null
null
561,827
article
1,568,588
Single Sign-On (SSO): The Key to Secure and Convenient Modern Authentication
Single Sign-On(SSO) is an authentication system that allows users to use a single set of credentials...
Aug 14 '23
the-role-of-single-sign-on-sso-in-modern-authentication-3k09
/donesrom/the-role-of-single-sign-on-sso-in-modern-authentication-3k09
https://dev.to/donesrom/the-role-of-single-sign-on-sso-in-modern-authentication-3k09
0
2
null
2023-08-14T22:16:50Z
en
null
2
https://media2.dev.to/dy…lpnhblj03851.png
https://media2.dev.to/dy…lpnhblj03851.png
https://dev.to/donesrom/the-role-of-single-sign-on-sso-in-modern-authentication-3k09
2023-08-14T22:16:50Z
2023-08-14T22:26:44Z
null
2023-08-14T22:16:50Z
2023-08-14T22:16:50Z
7
['sso', 'cybersecurity', 'infosec']
sso, cybersecurity, infosec
{'name': 'Donesrom', 'username': 'donesrom', 'twitter_username': None, 'github_username': 'Donesrom', 'user_id': 1032083, 'website_url': 'https://donesrom.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu...
null
null
561,828
article
1,559,395
SQL injection in Rails - Learn from an attacker’s shoes
Imagine a scenario where an attacker gains unauthorized access to your application's database,...
Aug 4 '23
sql-injection-in-rails-learn-from-an-attackers-shoes-3o69
/haseebeqx/sql-injection-in-rails-learn-from-an-attackers-shoes-3o69
https://dev.to/haseebeqx/sql-injection-in-rails-learn-from-an-attackers-shoes-3o69
0
5
null
2023-08-04T19:13:16Z
en
null
5
null
https://media2.dev.to/dy…t40ecsaqczfz.png
https://dev.to/haseebeqx/sql-injection-in-rails-learn-from-an-attackers-shoes-3o69
2023-08-04T17:06:37Z
2024-07-11T07:38:57Z
null
2023-08-04T19:13:16Z
2023-08-04T19:13:16Z
6
['rails', 'security', 'infosec']
rails, security, infosec
{'name': 'Haseeb Annadamban', 'username': 'haseebeqx', 'twitter_username': 'Haseebeqx', 'github_username': 'haseebeqx', 'user_id': 17618, 'website_url': 'https://haseebeqx.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3....
null
null
561,830
article
1,535,238
Unveiling the Sudo Heap Overflow Vulnerability (CVE-2021-3156): A Critical Security Flaw Reappears
Introduction In this blog post, we dive into the intricacies of the Sudo Heap Overflow...
Jul 12 '23
unveiling-the-sudo-heap-overflow-vulnerability-cve-2021-3156-a-critical-security-flaw-reappears-1ocf
/tutorialboy/unveiling-the-sudo-heap-overflow-vulnerability-cve-2021-3156-a-critical-security-flaw-reappears-1ocf
https://dev.to/tutorialboy/unveiling-the-sudo-heap-overflow-vulnerability-cve-2021-3156-a-critical-security-flaw-reappears-1ocf
0
1
20,294
2023-07-12T20:18:43Z
en
null
1
https://media2.dev.to/dy…4105n2f5tooe.png
https://media2.dev.to/dy…4105n2f5tooe.png
https://tutorialboy24.blogspot.com/2023/07/unveiling-sudo-heap-overflow.html
2023-07-12T20:18:43Z
2023-07-12T20:19:05Z
null
2023-07-12T20:18:43Z
2023-07-12T20:18:43Z
13
['cybersecurity', 'infosec', 'linux', 'cve']
cybersecurity, infosec, linux, cve
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,831
article
1,436,072
Security By Design
We consider many things valuable in our lives: money, freedom, and homes, for instance. Yet all of...
Apr 14 '23
security-by-design-3ip2
/prove/security-by-design-3ip2
https://dev.to/prove/security-by-design-3ip2
0
1
null
2023-04-14T17:32:27Z
null
null
1
https://media2.dev.to/dy…v6bicljns2xy.PNG
https://media2.dev.to/dy…v6bicljns2xy.PNG
https://www.prove.com/blog/security-by-design
2023-04-14T17:32:28Z
null
null
2023-04-14T17:32:27Z
2023-04-14T17:32:27Z
4
['prove', 'security', 'pii', 'infosec']
prove, security, pii, infosec
{'name': 'Nicholas DeWald', 'username': 'ndewald', 'twitter_username': None, 'github_username': None, 'user_id': 1020255, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpr...
{'name': 'Prove Identity', 'username': 'prove', 'slug': 'prove', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6588%2F3532448a-d161-4f1f-afe8-afdd3aabf660.png', 'profi...
null
561,832
article
1,461,853
Auth.Tesla.com's Vulnerability Leads To Account Takeover of Internal Tesla Accounts
Introduction This is rewritten article from the bugcrowd report submitted by the security...
May 8 '23
authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci
/tutorialboy/authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci
https://dev.to/tutorialboy/authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci
0
9
null
2023-05-08T23:45:55Z
null
null
9
https://media2.dev.to/dy…1mtrlmq0rpfg.png
https://media2.dev.to/dy…1mtrlmq0rpfg.png
https://dev.to/tutorialboy/authteslacoms-vulnerability-leads-to-account-takeover-of-internal-tesla-accounts-1fci
2023-05-08T23:45:55Z
2023-05-08T23:46:14Z
null
2023-05-08T23:45:55Z
2023-05-08T23:45:55Z
4
['cybersecurity', 'infosec', 'informationsecurity', 'opensource']
cybersecurity, infosec, informationsecurity, opensource
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,833
article
1,449,187
How to automate compliance checks with AWS Audit Manager
AWS Audit Manager is a service that simplifies the process of auditing and managing compliance...
Apr 26 '23
how-to-automate-compliance-checks-with-aws-audit-manager-2f8n
/aws-builders/how-to-automate-compliance-checks-with-aws-audit-manager-2f8n
https://dev.to/aws-builders/how-to-automate-compliance-checks-with-aws-audit-manager-2f8n
0
2
null
2023-04-26T17:50:41Z
null
null
2
https://media2.dev.to/dy…eonyox4mqxty.png
https://media2.dev.to/dy…eonyox4mqxty.png
https://dev.to/aws-builders/how-to-automate-compliance-checks-with-aws-audit-manager-2f8n
2023-04-26T17:50:41Z
2023-04-26T20:56:20Z
null
2023-04-26T17:50:41Z
2023-04-26T17:50:41Z
5
['aws', 'cloudaudit', 'infosec']
aws, cloudaudit, infosec
{'name': 'Wilklins Nyatteng', 'username': 'wilklins', 'twitter_username': 'wilklins__', 'github_username': 'WILKLINS', 'user_id': 1037358, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fup...
{'name': 'AWS Community Builders ', 'username': 'aws-builders', 'slug': 'aws-builders', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F2794%2F88da75b6-aadd-4ea1-8083-ae...
null
561,834
article
1,449,230
WebLogic Deserialization Vulnerability - CVE-2023-21839
Introduction WebLogic is an application server produced by Oracle Corporation in the...
Apr 26 '23
weblogic-deserialization-vulnerability-cve-2023-21839-4ed6
/tutorialboy/weblogic-deserialization-vulnerability-cve-2023-21839-4ed6
https://dev.to/tutorialboy/weblogic-deserialization-vulnerability-cve-2023-21839-4ed6
0
1
null
2023-04-26T20:17:32Z
null
null
1
https://media2.dev.to/dy…to32i86k97p9.png
https://media2.dev.to/dy…to32i86k97p9.png
https://dev.to/tutorialboy/weblogic-deserialization-vulnerability-cve-2023-21839-4ed6
2023-04-26T20:17:33Z
2023-04-26T20:19:41Z
null
2023-04-26T20:17:32Z
2023-04-26T20:17:32Z
3
['cybersecurity', 'infosec', 'cve']
cybersecurity, infosec, cve
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,835
article
1,406,324
Secret handling in modern cloud-scale enterprise applications
Can the experts here please help me understand how secrets (certs, keys, etc) are managed and...
Mar 19 '23
secret-handling-in-modern-cloud-scale-enterprise-applications-1732
/security_dreamer/secret-handling-in-modern-cloud-scale-enterprise-applications-1732
https://dev.to/security_dreamer/secret-handling-in-modern-cloud-scale-enterprise-applications-1732
0
0
null
2023-03-19T03:45:25Z
null
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/security_dreamer/secret-handling-in-modern-cloud-scale-enterprise-applications-1732
2023-03-19T03:45:26Z
null
null
2023-03-19T03:45:25Z
2023-03-19T03:45:25Z
1
['security', 'cicd', 'secrets', 'infosec']
security, cicd, secrets, infosec
{'name': 'Security_Dreamer', 'username': 'security_dreamer', 'twitter_username': 'mektare', 'github_username': None, 'user_id': 1047932, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo...
null
null
561,836
article
1,394,793
The InfoSec Essential Guide to Vulnerability Management
Vulnerability management refers to the identification, classification, prioritization, and...
Mar 9 '23
the-infosec-essential-guide-to-vulnerability-management-5g9f
/yayabobi/the-infosec-essential-guide-to-vulnerability-management-5g9f
https://dev.to/yayabobi/the-infosec-essential-guide-to-vulnerability-management-5g9f
0
0
null
2023-03-09T18:25:57Z
en
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://cybeready.com/category/the-infosec-essential-guide-to-vulnerability-management
2023-03-09T18:25:58Z
null
null
2023-03-09T18:25:57Z
2023-03-09T18:25:57Z
10
['infosec', 'cybersecurity']
infosec, cybersecurity
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro...
null
null
561,837
article
1,399,650
PSA: A NEW SCAM TARGETING TECH FOUNDERS
Teams of Scammers are impersonating Investors to steal your identity as well as your ideas.
Mar 13 '23
psa-a-new-scam-targeting-tech-founders-1bfa
/glind/psa-a-new-scam-targeting-tech-founders-1bfa
https://dev.to/glind/psa-a-new-scam-targeting-tech-founders-1bfa
1
0
null
2023-03-13T23:01:42Z
en
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/glind/psa-a-new-scam-targeting-tech-founders-1bfa
2023-03-13T23:01:42Z
2023-03-13T23:04:24Z
null
2023-03-13T23:01:42Z
2023-12-22T18:52:50Z
2
['investors', 'scams', 'infosec', 'security']
investors, scams, infosec, security
{'name': 'Greg Lind', 'username': 'glind', 'twitter_username': 'glind', 'github_username': 'glind', 'user_id': 98051, 'website_url': 'http://www.buildly.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo...
null
null
561,838
article
1,347,861
Have you integrated CrowdSec into your XSOAR platform yet?🔓
✅Avoid background noise from the Internet 👉 Reduce the volume of alerts. ✅Have more oversight and...
Jan 31 '23
have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5
/olispt/have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5
https://dev.to/olispt/have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5
0
0
null
2023-01-31T09:26:49Z
en
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/olispt/have-you-integrated-crowdsec-into-your-xsoar-platform-yet-18p5
2023-01-31T09:26:49Z
2023-01-31T10:54:34Z
null
2023-01-31T09:26:49Z
2023-01-31T09:26:49Z
1
['threatintelligence', 'infosec', 'opensource', 'security']
threatintelligence, infosec, opensource, security
{'name': 'Oli SPT', 'username': 'olispt', 'twitter_username': 'busioli', 'github_username': None, 'user_id': 1014105, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofil...
null
null
561,839
article
1,384,191
The Alarming Rise of Social Engineering Attacks in the Financial Sector
Gone are the days of masks and guns for bank and financial institutions robberies. Criminals have...
Mar 1 '23
the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector-2kb0
/sennovate/the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector-2kb0
https://dev.to/sennovate/the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector-2kb0
0
0
null
2023-03-01T18:15:57Z
en
null
0
https://media2.dev.to/dy…xabeank6tpsn.png
https://media2.dev.to/dy…xabeank6tpsn.png
https://sennovate.com/the-alarming-rise-of-social-engineering-attacks-in-the-financial-sector/
2023-03-01T18:15:57Z
null
null
2023-03-01T18:15:57Z
2023-03-01T18:15:57Z
1
['cybersecurity', 'security', 'infosec', 'beginners']
cybersecurity, security, infosec, beginners
{'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
null
null
561,840
article
1,341,066
How I obtained my CISSP
Intro The Certified Information Systems Security Professional or CISSP is known for its...
Jan 25 '23
how-i-obtained-my-cissp-hhe
/terraier/how-i-obtained-my-cissp-hhe
https://dev.to/terraier/how-i-obtained-my-cissp-hhe
0
2
null
2023-01-25T18:15:48Z
en
null
2
https://media2.dev.to/dy…euqdzdqm0mmu.png
https://media2.dev.to/dy…euqdzdqm0mmu.png
https://www.toul.io/how-i-got-my-cissp/
2023-01-25T18:15:48Z
2023-02-18T17:58:46Z
null
2023-01-25T18:15:48Z
2023-01-25T18:15:48Z
4
['cybersecurity', 'career', 'infosec', 'security']
cybersecurity, career, infosec, security
{'name': 'Toul', 'username': 'terraier', 'twitter_username': None, 'github_username': 'Peter-Lankton', 'user_id': 590046, 'website_url': 'https://cranecybersecurityconsulting.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads....
null
null
561,841
article
1,339,605
The Real-World Impacts of Social Engineering
What Is Social Engineering? Social engineering is a type of attack that takes place due to human...
Jan 24 '23
the-real-world-impacts-of-social-engineering-42pb
/sennovate/the-real-world-impacts-of-social-engineering-42pb
https://dev.to/sennovate/the-real-world-impacts-of-social-engineering-42pb
0
0
null
2023-01-24T12:47:33Z
en
null
0
https://media2.dev.to/dy…c99to0idwz6s.png
https://media2.dev.to/dy…c99to0idwz6s.png
https://sennovate.com/the-real-world-impacts-of-social-engineering/
2023-01-24T12:47:34Z
2023-02-09T08:53:49Z
null
2023-01-24T12:47:33Z
2023-01-24T12:47:33Z
6
['cybersecurity', 'security', 'infosec', 'beginners']
cybersecurity, security, infosec, beginners
{'name': 'Sennovate', 'username': 'sennovate', 'twitter_username': 'Sennovate', 'github_username': None, 'user_id': 690169, 'website_url': 'https://www.sennovate.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
null
null
561,842
article
1,281,968
10 years in the InfoSec industry
Ten years ago, in December 2012, I have officially started my career in the (Information) Security...
Dec 6 '22
10-years-in-the-infosec-industry-1efh
/dorneanu/10-years-in-the-infosec-industry-1efh
https://dev.to/dorneanu/10-years-in-the-infosec-industry-1efh
0
0
null
2022-12-06T07:34:26Z
en
null
0
null
https://media2.dev.to/dy…qj5hhg4n0yic.png
https://blog.dornea.nu/2022/12/02/10-years-in-the-infosec-industry/
2022-12-02T16:20:45Z
null
2022-12-06T07:34:26Z
2022-12-02T13:36:00Z
2022-12-02T13:36:00Z
6
['security', 'cloud', 'learning', 'infosec']
security, cloud, learning, infosec
{'name': 'Victor Dorneanu', 'username': 'dorneanu', 'twitter_username': 'victordorneanu', 'github_username': 'dorneanu', 'user_id': 284490, 'website_url': 'https://blog.dornea.nu', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads....
null
null
561,843
article
1,258,632
A Brief Introduction to SAML Security Vector
SAML started in 2001, and the final SAML 2.0 version was released in 2005. Since then, no major...
Nov 16 '22
a-brief-introduction-to-saml-security-vector-11hf
/tutorialboy/a-brief-introduction-to-saml-security-vector-11hf
https://dev.to/tutorialboy/a-brief-introduction-to-saml-security-vector-11hf
0
8
null
2022-11-16T04:56:45Z
en
null
8
null
https://media2.dev.to/dy…h6ko5ard2y56.png
https://tutorialboy24.blogspot.com/2022/11/a-brief-introduction-to-saml-security.html
2022-11-16T04:52:23Z
2022-11-16T04:57:05Z
2022-11-16T04:56:45Z
2022-11-16T02:10:00Z
2022-11-16T02:10:00Z
29
['saml', 'bugbounty', 'cybersecurity', 'infosec']
saml, bugbounty, cybersecurity, infosec
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,844
article
1,246,600
A Beginner’s Guide to Understanding & Recognizing Different Cyber Threats
With technology being so ever-evolving, it also presents a whole bucket of snakes to many users and...
Nov 7 '22
a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn
/chelmerrox/a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn
https://dev.to/chelmerrox/a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn
0
4
null
2022-11-07T15:25:36Z
en
null
4
https://media2.dev.to/dy…ik7udr0y2ow1.PNG
https://media2.dev.to/dy…ik7udr0y2ow1.PNG
https://dev.to/chelmerrox/a-beginners-guide-to-understanding-recognizing-different-cyber-threats-3pmn
2022-11-07T14:01:10Z
2022-11-08T04:43:10Z
null
2022-11-07T15:25:36Z
2022-11-07T15:25:36Z
5
['beginners', 'cybersecurity', 'infosec', 'informationsecurity']
beginners, cybersecurity, infosec, informationsecurity
{'name': 'Losalini Rokocakau', 'username': 'chelmerrox', 'twitter_username': None, 'github_username': 'chelmerrox', 'user_id': 967002, 'website_url': 'https://github.com/chelmerrox', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload...
null
null
561,845
article
1,246,173
Mastodon Verification Post
You can find my profile here => Mastodon Have a great day!
Nov 7 '22
mastodon-verification-post-2ci5
/wandering-geek/mastodon-verification-post-2ci5
https://dev.to/wandering-geek/mastodon-verification-post-2ci5
0
0
null
2022-11-07T07:19:35Z
en
null
0
null
https://media2.dev.to/dy…80d0te2a2dka.png
https://dev.to/wandering-geek/mastodon-verification-post-2ci5
2022-11-07T07:19:35Z
2024-01-09T09:06:17Z
null
2022-11-07T07:19:35Z
2022-11-07T07:19:35Z
1
['security', 'mastodon', 'infosec']
security, mastodon, infosec
{'name': 'Krishna', 'username': 'wandering-geek', 'twitter_username': None, 'github_username': 'wanderingeek', 'user_id': 190497, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fu...
null
null
561,846
article
1,234,480
Android Security : A Checklist For Exploiting WebView
Source :-...
Oct 29 '22
android-security-a-checklist-for-exploiting-webview-5379
/tutorialboy/android-security-a-checklist-for-exploiting-webview-5379
https://dev.to/tutorialboy/android-security-a-checklist-for-exploiting-webview-5379
0
2
20,299
2022-10-29T06:57:00Z
en
null
2
https://media2.dev.to/dy…6yygwqtkpgvh.png
https://media2.dev.to/dy…6yygwqtkpgvh.png
https://tutorialboy24.blogspot.com/2022/10/android-security-checklist-for.html
2022-10-28T19:05:33Z
null
null
2022-10-29T06:57:00Z
2022-10-29T06:57:00Z
11
['cybersecurity', 'infosec', 'android', 'informationsecurity']
cybersecurity, infosec, android, informationsecurity
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,847
article
1,234,497
Spring Actuator - Finding Actuators using Static Code Analysis - Part 2
In the first part of this series, we have discussed the risks inherent in exposing the Actuator...
Oct 29 '22
spring-actuator-finding-actuators-using-static-code-analysis-part-2-4ijo
/tutorialboy/spring-actuator-finding-actuators-using-static-code-analysis-part-2-4ijo
https://dev.to/tutorialboy/spring-actuator-finding-actuators-using-static-code-analysis-part-2-4ijo
0
1
20,295
2022-10-29T02:00:00Z
en
null
1
https://media2.dev.to/dy…6cblbhjqcu0f.png
https://media2.dev.to/dy…6cblbhjqcu0f.png
https://tutorialboy24.blogspot.com/2022/10/spring-actuator-finding-actuators-using.html
2022-10-28T19:49:26Z
null
null
2022-10-29T02:00:00Z
2022-10-29T02:00:00Z
10
['cybersecurity', 'infosec', 'security', 'informationsecurity']
cybersecurity, infosec, security, informationsecurity
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,848
article
1,234,486
Spring Actuator - Stealing Secrets Using Spring Actuators - Part 1:
Spring is a set of frameworks for developing Applications in Java. It is widely used, and so it is...
Oct 28 '22
spring-actuator-stealing-secrets-using-spring-actuators-part-1-4o2a
/tutorialboy/spring-actuator-stealing-secrets-using-spring-actuators-part-1-4o2a
https://dev.to/tutorialboy/spring-actuator-stealing-secrets-using-spring-actuators-part-1-4o2a
0
1
20,295
2022-10-28T20:19:00Z
en
null
1
https://media2.dev.to/dy…wgkuks4hut3t.png
https://media2.dev.to/dy…wgkuks4hut3t.png
https://tutorialboy24.blogspot.com/2022/09/spring-actuator-stealing-secrets-using.html
2022-10-28T19:19:51Z
null
null
2022-10-28T20:19:00Z
2022-10-28T20:19:00Z
9
['cybersecurity', 'infosec', 'springboot', 'informationsecurity']
cybersecurity, infosec, springboot, informationsecurity
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,849
article
1,234,476
A Remote Code Execution in JXPath Library (CVE-2022-41852)
Source :- https://tutorialboy24.blogspot.com/2022/10/a-remote-code-execution-in-jxpath.html On...
Oct 28 '22
a-remote-code-execution-in-jxpath-library-cve-2022-41852-253d
/tutorialboy/a-remote-code-execution-in-jxpath-library-cve-2022-41852-253d
https://dev.to/tutorialboy/a-remote-code-execution-in-jxpath-library-cve-2022-41852-253d
0
2
20,294
2022-10-28T18:47:09Z
en
null
2
https://media2.dev.to/dy…ofzwzoegsx9v.png
https://media2.dev.to/dy…ofzwzoegsx9v.png
https://tutorialboy24.blogspot.com/2022/10/a-remote-code-execution-in-jxpath.html
2022-10-28T18:47:09Z
2022-10-28T19:02:32Z
null
2022-10-28T18:47:09Z
2022-10-28T18:47:09Z
4
['cybersecurity', 'java', 'infosec', 'informationsecurity']
cybersecurity, java, infosec, informationsecurity
{'name': 'TutorialBoy', 'username': 'tutorialboy', 'twitter_username': 'TutorialBoy24', 'github_username': 'VarmaKollu', 'user_id': 784146, 'website_url': 'https://tutorialboy24.blogspot.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fde...
null
null
561,850
article
1,220,126
🪄 Grype jq tricks : csv for spreadsheets 📊
❔ About Often, when you talk about an image vulnerabilities, you need to get that kind of...
Oct 18 '22
grype-jq-tricks-csv-for-spreadsheets-c7h
/optnc/grype-jq-tricks-csv-for-spreadsheets-c7h
https://dev.to/optnc/grype-jq-tricks-csv-for-spreadsheets-c7h
4
5
18,947
2022-10-18T19:38:03Z
en
null
5
https://media2.dev.to/dy…198t019ono9c.png
https://media2.dev.to/dy…198t019ono9c.png
https://dev.to/optnc/grype-jq-tricks-csv-for-spreadsheets-c7h
2022-10-14T22:21:45Z
2022-10-19T11:23:32Z
null
2022-10-18T19:38:03Z
2022-10-19T11:22:41Z
1
['docker', 'security', 'devops', 'infosec']
docker, security, devops, infosec
{'name': 'adriens', 'username': 'adriens', 'twitter_username': 'rastadidi', 'github_username': 'adriens', 'user_id': 446871, 'website_url': 'https://www.linkedin.com/in/adrien-sales/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uplo...
{'name': 'opt-nc', 'username': 'optnc', 'slug': 'optnc', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5458%2F98dc3bfe-45f7-48c6-a182-21944edf46b6.jpg', 'profile_image...
null
561,851
article
1,214,157
Logging in, a thing we all hate
We've all seen this one, right? "As a user, I want to log in to the app." That's a lie. And not...
Oct 8 '22
logging-in-a-thing-we-all-hate-504d
/isaacdlyman/logging-in-a-thing-we-all-hate-504d
https://dev.to/isaacdlyman/logging-in-a-thing-we-all-hate-504d
3
25
null
2022-10-08T14:09:45Z
en
null
25
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/isaacdlyman/logging-in-a-thing-we-all-hate-504d
2022-10-08T04:47:39Z
null
null
2022-10-08T14:09:45Z
2023-09-12T16:29:45Z
11
['infosec', 'security', 'ux']
infosec, security, ux
{'name': 'Isaac Lyman', 'username': 'isaacdlyman', 'twitter_username': None, 'github_username': 'isaaclyman', 'user_id': 572, 'website_url': 'http://isaaclyman.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.co...
null
null
561,852
article
1,181,672
Blue Team Conference
Hey all! It's been a minute, to say the least. As I took on a new role as a Cloud security engineer...
Sep 16 '22
blue-team-conference-dn8
/pauld/blue-team-conference-dn8
https://dev.to/pauld/blue-team-conference-dn8
0
3
null
2022-09-16T18:27:40Z
en
null
3
https://media2.dev.to/dy…evswfem2xih1.jpg
https://media2.dev.to/dy…evswfem2xih1.jpg
https://dev.to/pauld/blue-team-conference-dn8
2022-09-01T17:25:01Z
2022-09-16T18:29:04Z
null
2022-09-16T18:27:40Z
2022-09-16T18:27:40Z
2
['blueteam', 'infosec', 'security']
blueteam, infosec, security
{'name': 'Paul', 'username': 'pauld', 'twitter_username': 'Arconopalous623', 'github_username': None, 'user_id': 152883, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro...
null
null
561,853
article
1,186,516
Reconmap 2.0.0 release notes
(Photo by NASA on Unsplash) Here we are again with another release notes for our vulnerability...
Sep 6 '22
reconmap-200-release-notes-45o8
/netfoe/reconmap-200-release-notes-45o8
https://dev.to/netfoe/reconmap-200-release-notes-45o8
0
0
null
2022-09-06T21:03:18Z
en
null
0
https://media2.dev.to/dy…c4svpp1lcn8s.jpg
https://media2.dev.to/dy…c4svpp1lcn8s.jpg
https://dev.to/netfoe/reconmap-200-release-notes-45o8
2022-09-06T21:03:18Z
null
null
2022-09-06T21:03:18Z
2022-09-06T21:03:18Z
2
['security', 'opensource', 'pentesting', 'infosec']
security, opensource, pentesting, infosec
{'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload...
{'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima...
null
561,854
article
1,181,286
Web Pentesting Learning - Beginner edition
After a couple of years of learning on my own, I created a brief list of the assets I think were most...
Sep 1 '22
web-pentesting-learning-beginner-edition-4clg
/theagilemonkeys/web-pentesting-learning-beginner-edition-4clg
https://dev.to/theagilemonkeys/web-pentesting-learning-beginner-edition-4clg
0
10
null
2022-09-01T09:37:07Z
en
null
10
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/theagilemonkeys/web-pentesting-learning-beginner-edition-4clg
2022-09-01T09:34:55Z
null
null
2022-09-01T09:37:07Z
2022-09-01T09:37:07Z
3
['pentesting', 'security', 'infosec']
pentesting, security, infosec
{'name': 'J2RGEZ', 'username': 'j2rguez', 'twitter_username': 'J2RGUEZ', 'github_username': None, 'user_id': 9785, 'website_url': 'https://github.com/juanjoman', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2F...
{'name': 'The Agile Monkeys', 'username': 'theagilemonkeys', 'slug': 'theagilemonkeys', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F645%2F69ecc7e6-e64b-4230-928e-564...
null
561,855
article
1,155,384
On the hook of a phisher
Phishing campaigns are standard, but they are typically poorly done and low-effort. But, sometimes,...
Nov 4 '22
on-the-hook-of-a-phisher-1f6b
/jpdias/on-the-hook-of-a-phisher-1f6b
https://dev.to/jpdias/on-the-hook-of-a-phisher-1f6b
0
1
null
2022-11-04T22:35:02Z
en
null
1
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://jpdias.me/infosec/2022/07/30/phishing-story.html
2022-07-30T13:20:06Z
null
2022-11-04T22:35:02Z
2022-07-30T00:00:00Z
2022-07-30T00:00:00Z
9
['infosec', 'phishing', 'security']
infosec, phishing, security
{'name': 'JP Dias', 'username': 'jpdias', 'twitter_username': None, 'github_username': 'jpdias', 'user_id': 3886, 'website_url': 'https://jpdias.me', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fus...
null
null
561,856
article
1,079,292
Reconmap 1.5.0 release notes
We are excited to share release notes for Reconmap 1.5.0, immediately available on Github. Version...
May 8 '22
reconmap-150-release-notes-1agi
/netfoe/reconmap-150-release-notes-1agi
https://dev.to/netfoe/reconmap-150-release-notes-1agi
0
3
null
2022-05-08T19:12:59Z
null
null
3
null
https://media2.dev.to/dy…0pvnhsaym127.png
https://dev.to/netfoe/reconmap-150-release-notes-1agi
2022-05-08T19:12:59Z
2022-05-08T19:25:53Z
null
2022-05-08T19:12:59Z
2022-05-08T19:12:59Z
2
['security', 'mssp', 'infosec', 'pentesting']
security, mssp, infosec, pentesting
{'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload...
{'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima...
null
561,857
article
1,075,764
🗞️ Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?
🛡️ About Java 18 is out since a few weeks. Let's see how we can handle its integration...
May 5 '22
java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g
/optnc/java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g
https://dev.to/optnc/java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g
1
3
18,376
2022-05-05T01:57:41Z
null
null
3
https://media2.dev.to/dy…pbjhps34plab.png
https://media2.dev.to/dy…pbjhps34plab.png
https://dev.to/optnc/java-eclipse-temurin180110-jre-alpine-is-out-now-what--10g
2022-05-04T22:55:47Z
2022-06-23T20:42:46Z
null
2022-05-05T01:57:41Z
2022-05-26T21:56:52Z
1
['docker', 'java', 'infosec', 'devops']
docker, java, infosec, devops
{'name': 'adriens', 'username': 'adriens', 'twitter_username': 'rastadidi', 'github_username': 'adriens', 'user_id': 446871, 'website_url': 'https://www.linkedin.com/in/adrien-sales/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uplo...
{'name': 'opt-nc', 'username': 'optnc', 'slug': 'optnc', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5458%2F98dc3bfe-45f7-48c6-a182-21944edf46b6.jpg', 'profile_image...
null
561,858
article
1,044,297
¿Por qué no debo reutilizar mi contraseña?
En una nota anterior anterior, explicamos cómo la crisis sanitaria del momento ha acelerado la...
Apr 4 '22
test-4f3g
/shazer/test-4f3g
https://dev.to/shazer/test-4f3g
0
3
null
2022-04-04T15:16:47Z
null
null
3
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://sh4z3r.gitbook.io/blog/blog-spanish/por-que-no-debo-reutilizar-mi-contrasena
2022-04-04T15:16:47Z
2022-04-04T15:29:08Z
null
2022-04-04T15:16:47Z
2022-04-04T15:16:47Z
2
['informationsecurity', 'infosec', 'spanish']
informationsecurity, infosec, spanish
{'name': 'Shazer', 'username': 'shazer', 'twitter_username': 'ShazerTech', 'github_username': 'sh4z3r', 'user_id': 841877, 'website_url': 'https://sh4z3r.github.io', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.co...
null
null
561,859
article
1,038,617
Simulating a Phishing Attack Against Your Company
Spoiler: This is a post about defending against phishing attacks, not a guide for engaging as an...
Mar 30 '22
simulating-a-phishing-attack-against-your-company-5b3g
/theaccordance/simulating-a-phishing-attack-against-your-company-5b3g
https://dev.to/theaccordance/simulating-a-phishing-attack-against-your-company-5b3g
0
5
null
2022-03-30T00:35:29Z
null
null
5
https://media2.dev.to/dy…ui8fw6r8yw83.png
https://media2.dev.to/dy…ui8fw6r8yw83.png
https://dev.to/theaccordance/simulating-a-phishing-attack-against-your-company-5b3g
2022-03-30T00:10:29Z
null
null
2022-03-30T00:35:29Z
2022-03-30T00:35:29Z
3
['infosec', 'security']
infosec, security
{'name': 'Joe Mainwaring', 'username': 'theaccordance', 'twitter_username': None, 'github_username': 'theaccordance', 'user_id': 58970, 'website_url': 'http://mainwaring.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.am...
null
null
561,860
article
1,037,383
Where all DEVs fail in Security
Intro I have been in security for several years. My work is to test an application or an...
Mar 28 '22
where-all-devs-fail-in-security-360b
/fand0mas/where-all-devs-fail-in-security-360b
https://dev.to/fand0mas/where-all-devs-fail-in-security-360b
0
6
null
2022-03-28T21:34:49Z
null
null
6
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/fand0mas/where-all-devs-fail-in-security-360b
2022-03-28T21:34:49Z
2022-03-29T13:36:55Z
null
2022-03-28T21:34:49Z
2022-03-28T21:34:49Z
2
['infosec', 'webdev', 'programming', 'backend']
infosec, webdev, programming, backend
{'name': 'Theodoros Danos', 'username': 'fand0mas', 'twitter_username': 'fand0mas', 'github_username': None, 'user_id': 668832, 'website_url': 'https://blog.cybervelia.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amaz...
null
null
561,861
article
1,009,494
Reconmap 1.1.0 release notes
Although we haven't been publishing a lot of articles on this website, work hasn't stopped on the...
Mar 4 '22
reconmap-110-release-notes-35b8
/netfoe/reconmap-110-release-notes-35b8
https://dev.to/netfoe/reconmap-110-release-notes-35b8
0
5
null
2022-03-04T14:43:16Z
null
null
5
https://media2.dev.to/dy…g4tsm41vvoql.jpg
https://media2.dev.to/dy…g4tsm41vvoql.jpg
https://dev.to/netfoe/reconmap-110-release-notes-35b8
2022-03-04T14:43:16Z
2022-03-04T14:46:01Z
null
2022-03-04T14:43:16Z
2022-03-04T14:43:16Z
2
['vulnerability', 'pentesting', 'infosec', 'opensource']
vulnerability, pentesting, infosec, opensource
{'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload...
{'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima...
null
561,862
article
983,577
Data Breach: a 5 Steps Response Plan
A data breach is one of the worst scenarios in today’s enterprise security. What’s your plan to remediate this kind of situation, minimize the impact, and ensure business continuity? Although there is no such thing as a one-size-fits-all tactic, the following steps are crucial to a positive outcome.
Feb 9 '22
data-breach-a-5-steps-response-plan-ejg
/gitguardian/data-breach-a-5-steps-response-plan-ejg
https://dev.to/gitguardian/data-breach-a-5-steps-response-plan-ejg
0
2
null
2022-02-09T10:48:31Z
null
null
2
https://media2.dev.to/dy…ach-Response.png
https://media2.dev.to/dy…ach-Response.png
https://dev.to/gitguardian/data-breach-a-5-steps-response-plan-ejg
2022-02-09T10:43:47Z
2022-02-15T08:08:36Z
null
2022-02-09T10:48:31Z
2022-02-09T10:48:31Z
7
['databreach', 'cybersecurity', 'pentesting', 'infosec']
databreach, cybersecurity, pentesting, infosec
{'name': 'David Balaban', 'username': 'davidbalaban', 'twitter_username': 'PrivacyPC', 'github_username': None, 'user_id': 815226, 'website_url': 'https://macsecurity.net', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazo...
{'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png...
null
561,863
article
954,994
Should we target zero false positives?
While scanning millions of documents for secrets, should we really aim at reaching absolute zero or is the story not so simple?
Jan 14 '22
should-we-target-zero-false-positives-4kij
/gitguardian/should-we-target-zero-false-positives-4kij
https://dev.to/gitguardian/should-we-target-zero-false-positives-4kij
0
0
null
2022-01-14T09:42:36Z
null
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://blog.gitguardian.com/should-we-target-zero-false-positives/
2022-01-14T09:39:33Z
2022-03-18T09:17:50Z
null
2022-01-14T09:42:36Z
2022-01-14T09:42:36Z
5
['sast', 'infosec', 'appsec', 'datascience']
sast, infosec, appsec, datascience
{'name': 'Aurélien Gâteau', 'username': 'agateaugg', 'twitter_username': None, 'github_username': 'agateau-gg', 'user_id': 793690, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2F...
{'name': 'GitGuardian', 'username': 'gitguardian', 'slug': 'gitguardian', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F4775%2Fc847a31e-0f21-49f1-a6fe-7b55c0e0c954.png...
null
561,864
article
841,558
Handing over the keys to your digital kingdom to a Digital Agency
Every few years, either being forced by procurement rules or due to deteriorating relationships,...
Nov 26 '21
handing-over-the-keys-to-your-digital-kingdom-to-a-digital-agency-2f7k
/sylvainreiter/handing-over-the-keys-to-your-digital-kingdom-to-a-digital-agency-2f7k
https://dev.to/sylvainreiter/handing-over-the-keys-to-your-digital-kingdom-to-a-digital-agency-2f7k
0
0
null
2021-11-26T11:32:34Z
en
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://theuxcto.com/digital-blitz/handing-over-the-keys-to-your-digital-kingdom/
2021-09-26T22:46:55Z
null
2021-11-26T11:32:34Z
2021-09-26T19:29:31Z
2021-09-26T19:29:31Z
3
['digitalagency', 'devops', 'infosec']
digitalagency, devops, infosec
{'name': 'Sylvain Reiter / The UX CTO', 'username': 'sylvainreiter', 'twitter_username': 'sylvainreiter', 'github_username': None, 'user_id': 552484, 'website_url': 'https://theuxcto.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to...
null
null
561,865
article
904,958
Horrifying Vulnerabilities in the Death/Birth Certificate System
Premise: Death and birth certificates can be filed online, with practically no oversight. DefCon...
Nov 23 '21
horrifying-vulnerabilities-in-the-deathbirth-certificate-system-11mn
/scriptautomate/horrifying-vulnerabilities-in-the-deathbirth-certificate-system-11mn
https://dev.to/scriptautomate/horrifying-vulnerabilities-in-the-deathbirth-certificate-system-11mn
0
4
15,640
2021-11-23T04:46:38Z
null
null
4
https://media2.dev.to/dy…lb1de0fd4rr4.png
https://media2.dev.to/dy…lb1de0fd4rr4.png
https://icanteven.io/notes/VqxOhUXlNJaQ0jVq3LwsN/
2021-11-21T21:21:27Z
2021-11-23T05:10:43Z
null
2021-11-23T04:46:38Z
2021-11-23T04:46:38Z
2
['security', 'infosec', 'defcon', 'cybersecurity']
security, infosec, defcon, cybersecurity
{'name': 'Derek Ardolf', 'username': 'scriptautomate', 'twitter_username': None, 'github_username': 'ScriptAutomate', 'user_id': 220952, 'website_url': 'https://icanteven.xyz', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.a...
null
null
561,866
article
904,961
When IoT Attacks: Hacking a Linux-Powered Rifle
Premise: Let's place a computer on a gun, and give it WiFi. DefCon Response: Let's hijack it, and...
Nov 21 '21
when-iot-attacks-hacking-a-linux-powered-rifle-4b0j
/scriptautomate/when-iot-attacks-hacking-a-linux-powered-rifle-4b0j
https://dev.to/scriptautomate/when-iot-attacks-hacking-a-linux-powered-rifle-4b0j
0
1
15,640
2021-11-21T21:33:45Z
null
null
1
https://media2.dev.to/dy…zzrkxi2rpz2z.png
https://media2.dev.to/dy…zzrkxi2rpz2z.png
https://icanteven.io/notes/6wrzp9vxpgj6lhllbm2gh/
2021-11-21T21:31:34Z
2021-11-23T05:11:03Z
null
2021-11-21T21:33:45Z
2021-11-21T21:33:45Z
2
['security', 'infosec', 'defcon']
security, infosec, defcon
{'name': 'Derek Ardolf', 'username': 'scriptautomate', 'twitter_username': None, 'github_username': 'ScriptAutomate', 'user_id': 220952, 'website_url': 'https://icanteven.xyz', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.a...
null
null
561,867
article
842,543
A Checklist to Quickly Evaluate SaaS Security
You don't need extensive infosec reviews to gauge the relative maturity of a SaaS company's security. You just need their website.
Sep 27 '21
a-checklist-to-quickly-evaluate-saas-security-3hj3
/zmre/a-checklist-to-quickly-evaluate-saas-security-3hj3
https://dev.to/zmre/a-checklist-to-quickly-evaluate-saas-security-3hj3
0
3
null
2021-09-27T17:31:08Z
en
null
3
https://media2.dev.to/dy…st-blog-hero.jpg
https://media2.dev.to/dy…st-blog-hero.jpg
https://ironcorelabs.com/blog/2021/checklist-fast-evaluation-of-saas-security/
2021-09-27T17:31:08Z
null
null
2021-09-27T17:31:08Z
2021-09-27T17:31:08Z
4
['saas', 'security', 'infosec', 'evaluation']
saas, security, infosec, evaluation
{'name': 'Patrick Walsh', 'username': 'zmre', 'twitter_username': 'zmre', 'github_username': None, 'user_id': 150090, 'website_url': 'https://ironcorelabs.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu...
null
null
561,868
article
824,032
API Security 101: Improper Assets Management
And why missing documentation is a vulnerability. Photo by Martin Adams on...
Oct 19 '21
api-security-101-improper-assets-management-n8h
/shiftleft/api-security-101-improper-assets-management-n8h
https://dev.to/shiftleft/api-security-101-improper-assets-management-n8h
0
1
null
2021-10-19T22:53:30Z
en
null
1
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://blog.shiftleft.io/api-security-101-improper-assets-management-825bfe9ea0b4
2021-09-14T18:53:01Z
2021-10-19T22:53:35Z
2021-10-19T22:53:30Z
2021-09-14T14:33:12Z
2021-09-14T14:33:12Z
3
['api', 'infosec', 'softwareengineering', 'cybersecurity']
api, infosec, softwareengineering, cybersecurity
{'name': 'Cdebrincat', 'username': 'cdebrincat', 'twitter_username': None, 'github_username': 'Cdebrincat', 'user_id': 664390, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser...
{'name': 'ShiftLeft', 'username': 'shiftleft', 'slug': 'shiftleft', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3959%2Fd97d599b-5c90-4961-8582-5822bad94624.jpg', 'pr...
null
561,869
article
829,912
Top 5 Can’t-Miss Cybersecurity Awareness Tips
Don't let your organization fall victim to a cybersecurity attack. Stay ahead of cyberattacks before...
Sep 17 '21
top-5-can-t-miss-cybersecurity-awareness-tips-3jb1
/yayabobi/top-5-can-t-miss-cybersecurity-awareness-tips-3jb1
https://dev.to/yayabobi/top-5-can-t-miss-cybersecurity-awareness-tips-3jb1
0
1
null
2021-09-17T19:04:59Z
en
null
1
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/yayabobi/top-5-can-t-miss-cybersecurity-awareness-tips-3jb1
2021-09-17T19:04:59Z
2021-09-17T19:05:28Z
null
2021-09-17T19:04:59Z
2021-09-17T19:04:59Z
3
['cybersecurity', 'infosec']
cybersecurity, infosec
{'name': 'yayabobi', 'username': 'yayabobi', 'twitter_username': 'yayabobi', 'github_username': None, 'user_id': 665355, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fpro...
null
null
561,870
article
829,386
How to list Azure VM potentially affected by the OMI RCE
There is Remote Code Execution (RCE) vulnerability in the Open Management Infrastructure (OMI)...
Sep 17 '21
how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9
/omiossec/how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9
https://dev.to/omiossec/how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9
1
4
null
2021-09-17T10:36:08Z
en
null
4
null
https://media2.dev.to/dy…bid41i2n02xh.png
https://dev.to/omiossec/how-to-list-azure-vm-potentially-affected-by-the-omi-rce-cc9
2021-09-17T09:42:19Z
2021-09-22T04:47:38Z
null
2021-09-17T10:36:08Z
2021-09-21T13:51:34Z
1
['azure', 'infosec', 'security', 'omi']
azure, infosec, security, omi
{'name': 'Olivier Miossec', 'username': 'omiossec', 'twitter_username': 'omiossec_med', 'github_username': 'omiossec', 'user_id': 160244, 'website_url': 'https://github.com/omiossec', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploa...
null
null
561,871
article
828,547
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make...
Sep 16 '21
azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2
/azure/azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2
https://dev.to/azure/azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2
0
6
null
2021-09-16T19:17:34Z
en
null
6
https://media2.dev.to/dy…ja0csw9srgxp.png
https://media2.dev.to/dy…ja0csw9srgxp.png
https://dev.to/azure/azurefunbytes-episode-57-securing-azure-with-shehackspurple-23k2
2021-09-16T19:17:34Z
2021-09-21T14:40:20Z
null
2021-09-16T19:17:34Z
2021-09-16T19:17:34Z
4
['infosec', 'security', 'azure', 'cloud']
infosec, security, azure, cloud
{'name': 'Jay Gordon', 'username': 'jaydestro', 'twitter_username': 'jaydestro', 'github_username': 'jaydestro', 'user_id': 26924, 'website_url': 'https://azure.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c...
{'name': 'Microsoft Azure', 'username': 'azure', 'slug': 'azure', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F512%2F64ce0b82-730d-4ca0-8359-2c21513a0063.jpg', 'profi...
null
561,872
article
818,834
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make...
Sep 9 '21
azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode
/azure/azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode
https://dev.to/azure/azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode
0
8
null
2021-09-09T19:10:57Z
en
null
8
https://media2.dev.to/dy…ggctnip5abc9.png
https://media2.dev.to/dy…ggctnip5abc9.png
https://dev.to/azure/azurefunbytes-episode-56-secretless-applications-with-christosmatskas-3ode
2021-09-09T16:43:12Z
2021-09-09T19:12:39Z
null
2021-09-09T19:10:57Z
2021-09-09T19:10:57Z
3
['security', 'infosec', 'azure', 'serverless']
security, infosec, azure, serverless
{'name': 'Jay Gordon', 'username': 'jaydestro', 'twitter_username': 'jaydestro', 'github_username': 'jaydestro', 'user_id': 26924, 'website_url': 'https://azure.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c...
{'name': 'Microsoft Azure', 'username': 'azure', 'slug': 'azure', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F512%2F64ce0b82-730d-4ca0-8359-2c21513a0063.jpg', 'profi...
null
561,873
article
817,565
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make...
Sep 8 '21
azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb
/azure/azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb
https://dev.to/azure/azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb
0
7
null
2021-09-08T14:11:16Z
en
null
7
https://media2.dev.to/dy…bjdnpxpagq41.png
https://media2.dev.to/dy…bjdnpxpagq41.png
https://dev.to/azure/azurefunbytes-reminder-secretless-applications-with-christosmatskas-9-9-2021-1hpb
2021-09-08T14:11:16Z
null
null
2021-09-08T14:11:16Z
2021-09-08T14:11:16Z
3
['infosec', 'security', 'azure', 'serverless']
infosec, security, azure, serverless
{'name': 'Jay Gordon', 'username': 'jaydestro', 'twitter_username': 'jaydestro', 'github_username': 'jaydestro', 'user_id': 26924, 'website_url': 'https://azure.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c...
{'name': 'Microsoft Azure', 'username': 'azure', 'slug': 'azure', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F512%2F64ce0b82-730d-4ca0-8359-2c21513a0063.jpg', 'profi...
null
561,874
article
745,157
A (not so) Gentle Intro to Active Directory: ØxOPOSɆC [0xF09F8EA3] Challenge
Yet another month, yet another ØxOPOSɆC meetup. This is a write-up on the 0xF09F8EA3 edition...
Nov 4 '22
a-not-so-gentle-intro-to-active-directory-oxoposc-0xf09f8ea3-challenge-5878
/jpdias/a-not-so-gentle-intro-to-active-directory-oxoposc-0xf09f8ea3-challenge-5878
https://dev.to/jpdias/a-not-so-gentle-intro-to-active-directory-oxoposc-0xf09f8ea3-challenge-5878
0
0
null
2022-11-04T22:36:07Z
en
null
0
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://jpdias.me/infosec/writeup/2021/06/30/intro-to-ad-challenge.html
2021-07-01T15:20:42Z
null
2022-11-04T22:36:07Z
2021-06-30T00:00:00Z
2021-06-30T00:00:00Z
11
['activedirectory', 'oposec', 'infosec', 'writeup']
activedirectory, oposec, infosec, writeup
{'name': 'JP Dias', 'username': 'jpdias', 'twitter_username': None, 'github_username': 'jpdias', 'user_id': 3886, 'website_url': 'https://jpdias.me', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fus...
null
null
561,875
article
776,832
TryHackMe Ignite Room Walkthrough
https://tryhackme.com/room/ignite A new start-up has a few issues with their web server. ...
Jul 30 '21
tryhackme-ignite-room-walkthrough-5672
/wandering-geek/tryhackme-ignite-room-walkthrough-5672
https://dev.to/wandering-geek/tryhackme-ignite-room-walkthrough-5672
0
0
13,897
2021-07-30T17:25:56Z
en
null
0
null
https://media2.dev.to/dy…eseeym3rge7f.png
https://dev.to/wandering-geek/tryhackme-ignite-room-walkthrough-5672
2021-07-30T16:56:58Z
2021-08-07T09:13:40Z
null
2021-07-30T17:25:56Z
2021-07-30T17:25:56Z
6
['beginners', 'security', 'infosec']
beginners, security, infosec
{'name': 'Krishna', 'username': 'wandering-geek', 'twitter_username': None, 'github_username': 'wanderingeek', 'user_id': 190497, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fu...
null
null
561,876
article
641,817
When a crisis occurs - Panic
Another week rolls on by and it has been quite eventful. Managed to have my first COVID jab, so now...
Mar 22 '21
ports-open-everywhere-12jj
/testingtheeventhorizon/ports-open-everywhere-12jj
https://dev.to/testingtheeventhorizon/ports-open-everywhere-12jj
0
0
null
2021-03-22T07:37:43Z
en
null
0
https://media2.dev.to/dy…depsmhyb8mjg.jpg
https://media2.dev.to/dy…depsmhyb8mjg.jpg
https://dev.to/testingtheeventhorizon/ports-open-everywhere-12jj
2021-03-22T07:05:58Z
2021-03-22T07:38:17Z
null
2021-03-22T07:37:43Z
2021-03-22T07:37:43Z
6
['todayilearned', 'infosec', 'devjournal', 'security']
todayilearned, infosec, devjournal, security
{'name': 'Steveland', 'username': 'testingtheeventhorizon', 'twitter_username': None, 'github_username': 'decosta', 'user_id': 221401, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fupload...
null
{'name': 'todayilearned', 'bg_color_hex': '#ffedc9', 'text_color_hex': '#820000'}
561,877
article
671,735
A practical guide to writing secure Dockerfiles
Photo by Ishant Mishra on Unsplash Tools, techniques, and procedures to write secure...
Aug 24 '22
a-practical-guide-to-writing-secure-dockerfiles-2kgg
/madhuakula/a-practical-guide-to-writing-secure-dockerfiles-2kgg
https://dev.to/madhuakula/a-practical-guide-to-writing-secure-dockerfiles-2kgg
0
8
null
2022-08-24T00:49:50Z
en
null
8
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://medium.com/miro-engineering/a-practical-guide-to-writing-secure-dockerfiles-bf561224dd80
2021-04-19T16:29:02Z
null
2022-08-24T00:49:50Z
2021-04-19T12:32:01Z
2021-04-19T12:32:01Z
12
['miro', 'devops', 'infosec', 'security']
miro, devops, infosec, security
{'name': 'Madhu Akula', 'username': 'madhuakula', 'twitter_username': None, 'github_username': 'madhuakula', 'user_id': 166767, 'website_url': 'https://madhuakula.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws...
null
null
561,878
article
649,732
To Secure Today’s Code, It’s Time to Shift Left
The threat landscape is constantly evolving, and today’s DevOps professionals are under more pressure...
Mar 30 '21
to-secure-today-s-code-it-s-time-to-shift-left-4pdl
/advocatemack/to-secure-today-s-code-it-s-time-to-shift-left-4pdl
https://dev.to/advocatemack/to-secure-today-s-code-it-s-time-to-shift-left-4pdl
0
10
null
2021-03-30T06:39:08Z
en
null
10
https://media2.dev.to/dy…hkk4axxg8a5.jpeg
https://media2.dev.to/dy…hkk4axxg8a5.jpeg
https://dev.to/advocatemack/to-secure-today-s-code-it-s-time-to-shift-left-4pdl
2021-03-30T06:39:08Z
null
null
2021-03-30T06:39:08Z
2021-03-30T06:39:08Z
6
['cybersecurity', 'appsec', 'security', 'infosec']
cybersecurity, appsec, security, infosec
{'name': 'Mackenzie ', 'username': 'advocatemack', 'twitter_username': 'advocatemack', 'github_username': 'mackenziejj', 'user_id': 355398, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fu...
null
null
561,880
article
643,723
Writeup: HackTheBox Netmon- Without Metasploit (OSCP Prep)
To start, yes I misspelled *Netmon in my kali machine lol. Please don't come for me. Now onto the B...
Mar 25 '21
writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1
/xyzchris0/writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1
https://dev.to/xyzchris0/writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1
0
0
null
2021-03-25T19:51:37Z
en
null
0
https://media2.dev.to/dy…wo2xi8dpvghx.JPG
https://media2.dev.to/dy…wo2xi8dpvghx.JPG
https://dev.to/xyzchris0/writeup-hackthebox-netmon-without-metasploit-oscp-prep-1in1
2021-03-24T00:13:25Z
2021-03-29T12:05:38Z
null
2021-03-25T19:51:37Z
2021-03-25T19:51:37Z
9
['cybersecurity', 'hackthebox', 'webdev', 'infosec']
cybersecurity, hackthebox, webdev, infosec
{'name': 'Chris', 'username': 'xyzchris0', 'twitter_username': None, 'github_username': '0xHuey', 'user_id': 382144, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile...
null
null
561,881
article
617,243
When should my startup prioritize infosec?
If you imagine your organization as a sea-faring vessel, infosec’s goal is to ensure the boat can su...
Feb 24 '21
when-should-my-startup-prioritize-infosec-10e8
/goldfiglabs/when-should-my-startup-prioritize-infosec-10e8
https://dev.to/goldfiglabs/when-should-my-startup-prioritize-infosec-10e8
0
2
null
2021-02-24T20:04:34Z
en
null
2
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://blog.goldfiglabs.com/2021/02/23/when-should-my.html
2021-02-24T20:03:47Z
null
null
2021-02-24T20:04:34Z
2021-02-24T20:04:34Z
3
['infosec', 'secops', 'cloud', 'security']
infosec, secops, cloud, security
{'name': 'Gold Fig Labs', 'username': 'goldfiglabs', 'twitter_username': 'goldfiglabs', 'github_username': None, 'user_id': 577844, 'website_url': 'https://goldfiglabs.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amaz...
null
null
561,882
article
548,027
O que a série You pode te ensinar sobre segurança digital
(Atenção: Este texto pode conter spoilers da primeira temporada de “You”) Neste texto eu...
Dec 16 '21
o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77
/guiteixeira/o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77
https://dev.to/guiteixeira/o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77
0
0
null
2021-12-16T22:12:43Z
pt
null
0
null
https://media2.dev.to/dy…uwz8i5lbiuv8.png
https://dev.to/guiteixeira/o-que-a-serie-you-pode-te-ensinar-sobre-seguranca-digital-3j77
2020-12-20T21:36:34Z
2021-12-17T01:41:24Z
2021-12-16T22:12:43Z
2020-12-20T21:34:56Z
2020-12-20T21:34:56Z
18
['cybersecurity', 'infosec', 'sec']
cybersecurity, infosec, sec
{'name': 'Guilherme Teixeira ', 'username': 'guiteixeira', 'twitter_username': None, 'github_username': 'ggteixeira', 'user_id': 278991, 'website_url': 'https://guiteixeira.dev', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3...
null
null
561,883
article
529,067
Illustrated Notes on Web Security Essentials
Illustrated notes all about the essentials of web security
Nov 30 '20
illustrated-notes-on-web-security-essentials-3ob7
/egghead/illustrated-notes-on-web-security-essentials-3ob7
https://dev.to/egghead/illustrated-notes-on-web-security-essentials-3ob7
1
20
null
2020-11-30T18:03:02Z
en
null
20
https://media2.dev.to/dy…5tt8p9679077.png
https://media2.dev.to/dy…5tt8p9679077.png
https://dev.to/egghead/illustrated-notes-on-web-security-essentials-3ob7
2020-11-30T17:45:04Z
2020-11-30T18:05:03Z
null
2020-11-30T18:03:02Z
2020-12-01T07:36:15Z
2
['security', 'infosec']
security, infosec
{'name': 'Maggie Appleton', 'username': 'maggieappleton', 'twitter_username': None, 'github_username': 'MaggieAppleton', 'user_id': 111641, 'website_url': 'http://maggieappleton.com/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uplo...
{'name': 'egghead.io', 'username': 'egghead', 'slug': 'egghead', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F481%2Fa9cbe1bb-1763-4fa5-957f-a7578933cd22.png', 'profil...
null
561,884
article
482,550
Security Benchmarking at 1300 °C
Hot, Hotter, Magma Molten or semi-molten natural material that all igneous rocks are made...
Oct 9 '20
security-benchmarking-at-1300-c-1e0b
/duplys/security-benchmarking-at-1300-c-1e0b
https://dev.to/duplys/security-benchmarking-at-1300-c-1e0b
0
5
null
2020-10-09T20:36:22Z
en
null
5
https://media2.dev.to/dy…ino72lg4w632.jpg
https://media2.dev.to/dy…ino72lg4w632.jpg
https://dev.to/duplys/security-benchmarking-at-1300-c-1e0b
2020-10-09T20:31:18Z
2020-10-11T14:47:55Z
null
2020-10-09T20:36:22Z
2020-10-09T20:36:22Z
5
['infosec', 'fuzzing', 'vulnerability', 'magma']
infosec, fuzzing, vulnerability, magma
{'name': 'Paul Duplys', 'username': 'duplys', 'twitter_username': 'duplys', 'github_username': 'duplys', 'user_id': 393784, 'website_url': 'http://duplys.github.io/', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.c...
null
null
561,885
article
480,462
Pentesting Android Apps Using "Frida and Objection"
We are doing free training on "Pentesting Android Apps Using Frida and Objection" on 17th October. If...
Oct 7 '20
pentesting-android-apps-using-frida-and-objection-1oi
/rahulvenati/pentesting-android-apps-using-frida-and-objection-1oi
https://dev.to/rahulvenati/pentesting-android-apps-using-frida-and-objection-1oi
1
3
null
2020-10-07T16:05:17Z
en
null
3
null
https://dev-to-uploads.s…46ytpt1hl2rv.jpg
https://dev.to/rahulvenati/pentesting-android-apps-using-frida-and-objection-1oi
2020-10-07T16:05:17Z
2020-10-07T16:05:53Z
null
2020-10-07T16:05:17Z
2020-10-07T16:07:06Z
1
['android', 'pentesting', 'infosec', 'security']
android, pentesting, infosec, security
{'name': 'Rahul Venati', 'username': 'rahulvenati', 'twitter_username': 'rahulvenati', 'github_username': None, 'user_id': 439919, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2F...
null
null
561,886
article
472,378
Generating pentest reports with Reconmap
Let's be honest, pentesters do what they do because they are hackers (in the purest meaning of the wo...
Oct 2 '20
generating-pentest-reports-with-reconmap-4fj6
/netfoe/generating-pentest-reports-with-reconmap-4fj6
https://dev.to/netfoe/generating-pentest-reports-with-reconmap-4fj6
0
6
9,058
2020-10-02T16:06:32Z
en
null
6
https://media2.dev.to/dy…sdbza9pri6v6.jpg
https://media2.dev.to/dy…sdbza9pri6v6.jpg
http://blog.reconmap.org/post/generating-pentest-reports-with-reconmap
2020-10-02T16:06:32Z
2021-03-19T07:52:58Z
null
2020-10-02T16:06:32Z
2020-10-02T16:06:32Z
3
['security', 'pentesting', 'infosec', 'vulnerability']
security, pentesting, infosec, vulnerability
{'name': 'Santiago L', 'username': 'santiago', 'twitter_username': None, 'github_username': 'santiagolizardo', 'user_id': 480257, 'website_url': 'https://github.com/santiagolizardo', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-upload...
{'name': 'Netfoe', 'username': 'netfoe', 'slug': 'netfoe', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3623%2F98e3c219-c251-42c0-8f14-fa17ec6aa247.png', 'profile_ima...
null
561,887
article
405,244
Information Gathering with "theHarvester"
This is the first tool in the Red Team Tools series that I will be talking to you today. In this...
Jul 20 '20
information-gathering-with-theharvester-58l3
/tropyl/information-gathering-with-theharvester-58l3
https://dev.to/tropyl/information-gathering-with-theharvester-58l3
0
13
7,878
2020-07-20T16:22:22Z
en
null
13
https://media2.dev.to/dy…f06fkomd4jfj.png
https://media2.dev.to/dy…f06fkomd4jfj.png
https://tropyl.com/information-gathering-with-theharvester-ckcuotdsm008i7os1gtwyfxjv
2020-07-20T16:22:22Z
2020-07-20T16:22:51Z
null
2020-07-20T16:22:22Z
2020-07-20T16:22:22Z
9
['security', 'pentest', 'redteamtools', 'infosec']
security, pentest, redteamtools, infosec
{'name': 'sumanbasuli', 'username': 'sumanbasuli', 'twitter_username': 'TxSadhu', 'github_username': 'TxSadhu', 'user_id': 206688, 'website_url': 'https://tropyl.com', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws....
{'name': 'Tropyl', 'username': 'tropyl', 'slug': 'tropyl', 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F1816%2Ffaded488-7759-4c2f-bd7b-c3af7df6aa34.png', 'profile_ima...
null
561,888
article
371,253
Day-11: Read Info-sec Write-Ups!
Day-11: Did Unix badge exercise on Pentesterlab and was not in the mood to do research so did read so...
Jun 27 '20
day-11-read-info-sec-write-ups-3cd1
/th3lazykid/day-11-read-info-sec-write-ups-3cd1
https://dev.to/th3lazykid/day-11-read-info-sec-write-ups-3cd1
1
6
null
2020-06-27T17:20:28Z
null
null
6
https://media2.dev.to/dy…ftxqd396s601.jpg
https://media2.dev.to/dy…ftxqd396s601.jpg
https://dev.to/th3lazykid/day-11-read-info-sec-write-ups-3cd1
2020-06-27T14:42:19Z
2020-06-27T17:30:33Z
null
2020-06-27T17:20:28Z
2023-11-19T04:46:35Z
1
['cybersecurity', 'security', 'blogaday', 'infosec']
cybersecurity, security, blogaday, infosec
{'name': 'FENIL SHAH', 'username': 'th3lazykid', 'twitter_username': 'FenilShah1616', 'github_username': 'Th3lazykid', 'user_id': 316764, 'website_url': None, 'profile_image': 'https://media2.dev.to/dynamic/image/width=640,height=640,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fupl...
null
null
561,889