DEV Community

loading...

# security

👋 Sign in for the ability sort posts by top and latest.
How to prevent a public repo disaster🤔!!

How to prevent a public repo disaster🤔!!

Reactions 7 Comments
2 min read
Implementing Passwordless Authentication in Node.JS

Implementing Passwordless Authentication in Node.JS

Reactions 4 Comments 1
6 min read
Secure Your Azure DevOps Organization NOW!

Secure Your Azure DevOps Organization NOW!

Reactions 3 Comments
6 min read
API Security best Practices: What to keep in mind for apps?

API Security best Practices: What to keep in mind for apps?

Reactions 4 Comments
5 min read
Why Google FLoC trial has been labelled by privacy advocates as a worse idea!!!

Why Google FLoC trial has been labelled by privacy advocates as a worse idea!!!

Reactions 4 Comments
1 min read
SAWO - One Stop Solution for your Authentication Needs

SAWO - One Stop Solution for your Authentication Needs

Reactions 2 Comments
1 min read
Azure Disk Encryption for Data Disk on Linux

Azure Disk Encryption for Data Disk on Linux

Reactions 6 Comments
3 min read
AWS EC2 Resilience Engineering the easy way

AWS EC2 Resilience Engineering the easy way

Reactions 5 Comments
2 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

Reactions 8 Comments
1 min read
AzureFunBytes Episode 39 - Microsoft Identity with @ChristosMatskas!

AzureFunBytes Episode 39 - Microsoft Identity with @ChristosMatskas!

Reactions 7 Comments
2 min read
Alerta – Alert Monitoring Tool

Alerta – Alert Monitoring Tool

Reactions 4 Comments
1 min read
Seguridad "EN" la nube

Seguridad "EN" la nube

Reactions 5 Comments
2 min read
Domino's India database hacked

Domino's India database hacked

Reactions 5 Comments
1 min read
Malicious Docker Cryptomining Images Rack Up 20M Downloads

Malicious Docker Cryptomining Images Rack Up 20M Downloads

Reactions 2 Comments
1 min read
How a compromised NPM package can steal your secrets (POC + prevention)

How a compromised NPM package can steal your secrets (POC + prevention)

Reactions 6 Comments 2
8 min read
How to get SOC 2 Certified

How to get SOC 2 Certified

Reactions 4 Comments
2 min read
First open source implementation of the Google Zanzibar

First open source implementation of the Google Zanzibar

Reactions 4 Comments
1 min read
Identity and Access Management (IAM) in the Cloud Basics: Why Devs Should Care

Identity and Access Management (IAM) in the Cloud Basics: Why Devs Should Care

Reactions 2 Comments
8 min read
Windows Users Warned: A new Windows Desktop Vulnerability found.

Windows Users Warned: A new Windows Desktop Vulnerability found.

Reactions 7 Comments
1 min read
dirsearch – Web path scanner

dirsearch – Web path scanner

Reactions 2 Comments
1 min read
Nuclei Is A Fast Tool For Configurable Targeted Scanning Based On Templates

Nuclei Is A Fast Tool For Configurable Targeted Scanning Based On Templates

Reactions 2 Comments
1 min read
Prevent Click-Jacking in your web applications

Prevent Click-Jacking in your web applications

Reactions 6 Comments
5 min read
What do appsec and fire extinguishers have in common?

What do appsec and fire extinguishers have in common?

Reactions 6 Comments
3 min read
Warning: Elaborate Scams Abound!

Warning: Elaborate Scams Abound!

Reactions 2 Comments 2
4 min read
Authenticate users in Blazor Server with Twitch and Azure AD B2C

Authenticate users in Blazor Server with Twitch and Azure AD B2C

Reactions 6 Comments
4 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

Reactions 5 Comments
1 min read
Integrando o Azure Active Directory no AKS

Integrando o Azure Active Directory no AKS

Reactions 6 Comments
6 min read
Inicializando AWS CloudShell 3/3

Inicializando AWS CloudShell 3/3

Reactions 5 Comments
3 min read
Angular 8: Authentication using JSON Web Token (JWT) with HttpClient and HttpInterceptors.

Angular 8: Authentication using JSON Web Token (JWT) with HttpClient and HttpInterceptors.

Reactions 6 Comments 1
2 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

Reactions 6 Comments
8 min read
JSON web tokens are NOT meant for authenticating the same user repeatedly: Use session tokens instead

JSON web tokens are NOT meant for authenticating the same user repeatedly: Use session tokens instead

Reactions 431 Comments 50
7 min read
How To Implement Biometric 2FA in a Cryptocurrency Wallet with Python, Flask and TypingDNA

How To Implement Biometric 2FA in a Cryptocurrency Wallet with Python, Flask and TypingDNA

Reactions 12 Comments
19 min read
Integrate your website into Cloudflare

Integrate your website into Cloudflare

Reactions 7 Comments 2
1 min read
Chameleon – Customizable honeypots for monitoring network traffic

Chameleon – Customizable honeypots for monitoring network traffic

Reactions 8 Comments
1 min read
Fix Open Source Vulnerabilities AUTOMATICALLY with Dependabot

Fix Open Source Vulnerabilities AUTOMATICALLY with Dependabot

Reactions 7 Comments 2
2 min read
Where did these mysterious PrismJS npm versions come from?

Where did these mysterious PrismJS npm versions come from?

Reactions 4 Comments
5 min read
Using “pepper” to increase password storing security

Using “pepper” to increase password storing security

Reactions 4 Comments
3 min read
Get OneDrive data in UWP using Microsoft (Live) Accounts and Azure AD

Get OneDrive data in UWP using Microsoft (Live) Accounts and Azure AD

Reactions 5 Comments
5 min read
Application config in a single-row table

Application config in a single-row table

Reactions 6 Comments 1
5 min read
$whoami

$whoami

Reactions 3 Comments 2
1 min read
Changing a field's type in recent JDKs

Changing a field's type in recent JDKs

Reactions 6 Comments
5 min read
Prevent others sending emails using your domain name

Prevent others sending emails using your domain name

Reactions 44 Comments 3
4 min read
Top 9 Joomla Security Vulnerabilities and What You Can Do About Them

Top 9 Joomla Security Vulnerabilities and What You Can Do About Them

Comments
6 min read
Why just blocking port 80 won't help you

Why just blocking port 80 won't help you

Reactions 2 Comments
2 min read
Azure access scenarios, from a DevOps point of view

Azure access scenarios, from a DevOps point of view

Reactions 8 Comments
10 min read
3 Easy Steps to Set Up Certificate Authentication in ASP.NET Core

3 Easy Steps to Set Up Certificate Authentication in ASP.NET Core

Reactions 7 Comments
4 min read
Keep malicious Node modules behind bars!

Keep malicious Node modules behind bars!

Reactions 8 Comments 2
3 min read
How I solved github’s actions capture the flag challenge

How I solved github’s actions capture the flag challenge

Reactions 5 Comments
4 min read
Introducing the GitHub Security Overview | GitHub Security Center

Introducing the GitHub Security Overview | GitHub Security Center

Reactions 8 Comments 2
1 min read
TIP: Never leave your email address raw in the mailto link! Here's what to do instead

TIP: Never leave your email address raw in the mailto link! Here's what to do instead

Reactions 130 Comments 11
3 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

Reactions 9 Comments
7 min read
SQL injection cheat sheet

SQL injection cheat sheet

Reactions 3 Comments
1 min read
Using JSON Web Tokens for Authorization

Using JSON Web Tokens for Authorization

Reactions 4 Comments
4 min read
KeepassXC is my go-to Password Manager and here's why

KeepassXC is my go-to Password Manager and here's why

Reactions 2 Comments
4 min read
8 Top Git Security Issues & What To Do About Them

8 Top Git Security Issues & What To Do About Them

Reactions 8 Comments
9 min read
Automating Management of Google Compute Engine VM fleets at scale

Automating Management of Google Compute Engine VM fleets at scale

Reactions 5 Comments
15 min read
Introducción a la Ciberseguridad 🐱‍💻

Introducción a la Ciberseguridad 🐱‍💻

Reactions 3 Comments
2 min read
Frontend Security

Frontend Security

Reactions 143 Comments 5
4 min read
JWT and Go. How to integrate them with security requirements

JWT and Go. How to integrate them with security requirements

Reactions 40 Comments
20 min read
Enforce MFA on the Azure Portal using Conditional Access

Enforce MFA on the Azure Portal using Conditional Access

Reactions 9 Comments
3 min read
loading...