DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Simple PKI with CA issuer

Simple PKI with CA issuer

Reactions 5 Comments
4 min read
Serverless Application is not as secure as you might think!

Serverless Application is not as secure as you might think!

Reactions 7 Comments
5 min read
How to restrict country to access your website with Netlify?

How to restrict country to access your website with Netlify?

Reactions 5 Comments
1 min read
How to warn users about external links

How to warn users about external links

Reactions 8 Comments
3 min read
RepoMetaScore: evaluate supply chain risks of open-source projects

RepoMetaScore: evaluate supply chain risks of open-source projects

Reactions 7 Comments 1
2 min read
How-to Get Free API Security Testing Report

How-to Get Free API Security Testing Report

Reactions 6 Comments
1 min read
Two-factor authentication: How Beagle Security handles 2FA security testing

Two-factor authentication: How Beagle Security handles 2FA security testing

Reactions 6 Comments
1 min read
Encrypting Folders on MacOS

Encrypting Folders on MacOS

Reactions 2 Comments
1 min read
Running Basic Security Tests Against Twitter API

Running Basic Security Tests Against Twitter API

Reactions 4 Comments
1 min read
Why is Data Security a Developer Service Problem?

Why is Data Security a Developer Service Problem?

Reactions 6 Comments
5 min read
How to provide restricted & secure access to a third party, to your AWS accounts, using Attribute Based Access Control (ABAC)

How to provide restricted & secure access to a third party, to your AWS accounts, using Attribute Based Access Control (ABAC)

Reactions 6 Comments
8 min read
Machine Learning In Cyber Security

Machine Learning In Cyber Security

Reactions 4 Comments
4 min read
What is AWS Detective?

What is AWS Detective?

Reactions 5 Comments
2 min read
Desarrolla de forma segura, aplicando DevSecOps

Desarrolla de forma segura, aplicando DevSecOps

Reactions 10 Comments
5 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

Reactions 6 Comments
6 min read
Delegate Call - Context is Preserved

Delegate Call - Context is Preserved

Reactions 6 Comments
1 min read
PyScript XSS

PyScript XSS

Reactions 7 Comments
1 min read
Delegate Call - Order of Variables

Delegate Call - Order of Variables

Reactions 6 Comments
2 min read
Getting started developing Falco

Getting started developing Falco

Reactions 5 Comments
8 min read
Enarx: The future of Trusted Execution Environment Frameworks

Enarx: The future of Trusted Execution Environment Frameworks

Reactions 9 Comments
3 min read
Ethernaut系列-说明

Ethernaut系列-说明

Reactions 5 Comments
1 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

Reactions 6 Comments
1 min read
GitHub’s inconsistent access control

GitHub’s inconsistent access control

Reactions 4 Comments
4 min read
Controlling access in service-to-service communications with Cognito - Part 2

Controlling access in service-to-service communications with Cognito - Part 2

Reactions 10 Comments
5 min read
How to connect SuperTokens to a MySQL or to a PostgreSQL database

How to connect SuperTokens to a MySQL or to a PostgreSQL database

Reactions 6 Comments
11 min read
Build a discoverable change password form

Build a discoverable change password form

Reactions 9 Comments
1 min read
JWT, access token, and refresh token

JWT, access token, and refresh token

Reactions 3 Comments
3 min read
Simpler way to secure data with Ruby and Basis Theory

Simpler way to secure data with Ruby and Basis Theory

Reactions 6 Comments
3 min read
Prevent External Contracts

Prevent External Contracts

Reactions 6 Comments
2 min read
Types of Steganography methods that are used for hiding confidential data.

Types of Steganography methods that are used for hiding confidential data.

Reactions 8 Comments
4 min read
Careful while using tx.origin

Careful while using tx.origin

Reactions 7 Comments
2 min read
Denial of Service

Denial of Service

Reactions 9 Comments
1 min read
Accessing external Secrets in Gitlab CI

Accessing external Secrets in Gitlab CI

Reactions 10 Comments
2 min read
Avoiding code flaws, ok, but how?

Avoiding code flaws, ok, but how?

Reactions 10 Comments
3 min read
Controlling access to the API with Lambda authorizers

Controlling access to the API with Lambda authorizers

Reactions 9 Comments
6 min read
Security Pillar - Best Practice Areas

Security Pillar - Best Practice Areas

Reactions 3 Comments
2 min read
Force Send ETH - 2

Force Send ETH - 2

Reactions 10 Comments
2 min read
Arithmetic overflow/underflow

Arithmetic overflow/underflow

Reactions 10 Comments
2 min read
Force Send ETH - 1

Force Send ETH - 1

Reactions 9 Comments
1 min read
Re-Entrancy

Re-Entrancy

Reactions 9 Comments
2 min read
Preventing User Enumeration Attack in Laravel Apps

Preventing User Enumeration Attack in Laravel Apps

Reactions 9 Comments
5 min read
How to deploy SuperTokens with React and NodeJS on Vercel

How to deploy SuperTokens with React and NodeJS on Vercel

Reactions 9 Comments
3 min read
SaaS login trends

SaaS login trends

Reactions 3 Comments
1 min read
Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

Reactions 3 Comments 1
4 min read
SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

Reactions 3 Comments
7 min read
Passwordless face login with Entry in the React app

Passwordless face login with Entry in the React app

Reactions 6 Comments
3 min read
Setup Amazon GuardDuty and understand its feature

Setup Amazon GuardDuty and understand its feature

Reactions 3 Comments
3 min read
Secure TCP tunnel from anywhere with curl and nc for single connection

Secure TCP tunnel from anywhere with curl and nc for single connection

Reactions 6 Comments
14 min read
Helpot ohjeet salasanamanagerin käyttÜÜn

Helpot ohjeet salasanamanagerin käyttÜÜn

Reactions 4 Comments
4 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

Reactions 4 Comments
4 min read
Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

Reactions 4 Comments 1
1 min read
AWS Well-Architected Framework - Security Pillar

AWS Well-Architected Framework - Security Pillar

Reactions 4 Comments
2 min read
OpenAPI Specification: The Complete Guide

OpenAPI Specification: The Complete Guide

Reactions 25 Comments 1
5 min read
Storing Access Policies in Policy Files vs. in a Database

Storing Access Policies in Policy Files vs. in a Database

Reactions 5 Comments
5 min read
Calling the brute(force) squad

Calling the brute(force) squad

Reactions 5 Comments
6 min read
B2B SSO for SaaS applications - Don't Build. No-Code It

B2B SSO for SaaS applications - Don't Build. No-Code It

Reactions 4 Comments
1 min read
#1 iOS Security Tips: UIPasteboard | iOS Development

#1 iOS Security Tips: UIPasteboard | iOS Development

Reactions 7 Comments
1 min read
Security doesn’t have to be a blocker

Security doesn’t have to be a blocker

Reactions 3 Comments
3 min read
Free Trial! Beosin Vaa, the industry-leading automatic smart contract security analysis platform

Free Trial! Beosin Vaa, the industry-leading automatic smart contract security analysis platform

Reactions 3 Comments
1 min read
Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

Reactions 7 Comments
8 min read
loading...