Logo

dev-resources.site

for different kinds of informations.

infosec Article's
30 articles in total
Favicon
Amass API - REST API Solution for Domain Reconnaissance
Favicon
How to Integrate and Configure Zabbix for Monitoring IT Infrastructure
Favicon
What Does an Incredible Web Application Firewall Look Like?
Favicon
Why a Web Hosting Provider Needs SafeLine WAF
Favicon
Mastering Information Gathering -A foundation
Favicon
TECNO SRC Security Vulnerability Submission Function Survey
Favicon
Some handy notes for GCP pentesting
Favicon
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection
Favicon
What Does a Cyber Security Analyst Do?
Favicon
🌍 GeoIP Lookup Tool: Easily Get Geolocation Information of Any IP Address.
Favicon
How to Configure and Get Source IP in SafeLine WAF
Favicon
What is CDR?
Favicon
Phishing And Malware - A Practical Dive
Favicon
Cybersecurity Basics: A Beginner's Guide
Favicon
Easy CTF - Uma breve jornada de exploração com base no modelo OSI
Favicon
Sennovate is Now Among the Top 180 MSSPs in the World!
Favicon
Whats Information Security?
Favicon
# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero
Favicon
What are ITDR in cyber security?
Favicon
Unified Kill Chain
Favicon
API Security: Threats, Tools, and Best Practices
Favicon
Supply Chain Risk Management Strategy with Sennovate
Favicon
Secure Data Stack: Navigating Adoption Challenges of Data Encryption
Favicon
How Does WAF Prevent OS Command Injection Attacks
Favicon
How Does WAF Prevent XSS Attacks
Favicon
Top 5 Website Data Leakage Events 2024
Favicon
Why You Need to Protect Your Website and How
Favicon
Data Security Strategy Beyond Access Control: Data Encryption
Favicon
American Water Spaniel: Breed Facts and Training Tips
Favicon
Why the Crowdstrike Incident is NOT Solely Crowdstrike’s Fault

Featured ones: