DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Kriptografi

Kriptografi

Comments
3 min read
When should I use JWTs?

When should I use JWTs?

24
Comments 1
4 min read
Fetch External APIs in Next.js

Fetch External APIs in Next.js

1
Comments 1
3 min read
DevOps Security Integrating Best Practices into Your Pipeline

DevOps Security Integrating Best Practices into Your Pipeline

1
Comments
2 min read
Day 25: Container Security with Trivy - My 90 Days of DevOps Journey

Day 25: Container Security with Trivy - My 90 Days of DevOps Journey

3
Comments
4 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
Using secure_file_priv to Prevent Illicit MySQL Uploads

Using secure_file_priv to Prevent Illicit MySQL Uploads

1
Comments
1 min read
Simples Mudanças, Grandes Impactos: Como Fortalecer a Segurança da Sua Aplicação Laravel

Simples Mudanças, Grandes Impactos: Como Fortalecer a Segurança da Sua Aplicação Laravel

56
Comments 6
6 min read
Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Comments
4 min read
Production-Ready Vault Deployment on EC2: A Detailed Guide

Production-Ready Vault Deployment on EC2: A Detailed Guide

Comments
11 min read
Payment Passkeys @ Mastercard: Revolution for Payment Security

Payment Passkeys @ Mastercard: Revolution for Payment Security

2
Comments 1
3 min read
Serverless AWS Account Watcher

Serverless AWS Account Watcher

7
Comments 1
9 min read
Enhancing Android App Security: Best Practices

Enhancing Android App Security: Best Practices

1
Comments
4 min read
Entendendo TOTP

Entendendo TOTP

2
Comments
4 min read
Setting up Postgres on Azure private endpoints using CLI

Setting up Postgres on Azure private endpoints using CLI

Comments
2 min read
Compilation of Essential Web Pentesting Cheat Sheets

Compilation of Essential Web Pentesting Cheat Sheets

Comments
3 min read
How to Disable TLS v1.1 and Below in AWS ELB and RDS Aurora

How to Disable TLS v1.1 and Below in AWS ELB and RDS Aurora

2
Comments
3 min read
What is Secure Coding?

What is Secure Coding?

1
Comments
5 min read
Unlocking the World of Technology: My Journey and Skillset

Unlocking the World of Technology: My Journey and Skillset

Comments
2 min read
Nobody Cares About Security

Nobody Cares About Security

3
Comments 3
5 min read
Is CSP Actually Helping with Your Security? 🤔

Is CSP Actually Helping with Your Security? 🤔

57
Comments 5
5 min read
Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Comments
1 min read
Securing Postgres on Azure with a Private Endpoint

Securing Postgres on Azure with a Private Endpoint

2
Comments
4 min read
Cloud Resume Challenge pt 3: Exploring CosmoDB and Database Security

Cloud Resume Challenge pt 3: Exploring CosmoDB and Database Security

Comments
11 min read
Diffie-Hellman Key Exchange (DHKE) Algorithm

Diffie-Hellman Key Exchange (DHKE) Algorithm

1
Comments
3 min read
OAuth 2.0 Authentication in Spring Boot: A Guide to Integrating Google and GitHub Login

OAuth 2.0 Authentication in Spring Boot: A Guide to Integrating Google and GitHub Login

5
Comments
12 min read
Resolve Lambda URL Error - signature not match when using POST/PUT

Resolve Lambda URL Error - signature not match when using POST/PUT

8
Comments
4 min read
Keterampilan dan Pengetahuan Keamanan

Keterampilan dan Pengetahuan Keamanan

Comments
3 min read
AWS Network Firewall: A Simple Lab Setup Guide - ClickOps

AWS Network Firewall: A Simple Lab Setup Guide - ClickOps

7
Comments
8 min read
Easy on Humans, Hard on Bots

Easy on Humans, Hard on Bots

1
Comments
4 min read
Cross-platform RAT deployed by weaponized 'requests' clone

Cross-platform RAT deployed by weaponized 'requests' clone

8
Comments
4 min read
Software: Our SOC 2 journey

Software: Our SOC 2 journey

Comments
4 min read
Enhancing CloudFront Security with Response Headers

Enhancing CloudFront Security with Response Headers

1
Comments
6 min read
JWT: The Secret Code for Web Security 🔐

JWT: The Secret Code for Web Security 🔐

2
Comments
5 min read
🔒 Tip and Trick: MongoDB Security, Regulatory Compliance & Zero Trust 🔑

🔒 Tip and Trick: MongoDB Security, Regulatory Compliance & Zero Trust 🔑

5
Comments
2 min read
Security news weekly round-up - 30th August 2024

Security news weekly round-up - 30th August 2024

Comments
3 min read
CI/CD Pipelines: Improve with Test Impact Analysis

CI/CD Pipelines: Improve with Test Impact Analysis

Comments
5 min read
Unveiling the Future of Authorization with Cerbos

Unveiling the Future of Authorization with Cerbos

Comments
3 min read
How Test Impact Analysis Enhances SDLC

How Test Impact Analysis Enhances SDLC

Comments
3 min read
Replay Attack - Let's learn

Replay Attack - Let's learn

6
Comments 1
4 min read
Security on AWS: A Brief Overview

Security on AWS: A Brief Overview

Comments
1 min read
Unveiling the Secrets of Cookies: A Fun and Informative Guide

Unveiling the Secrets of Cookies: A Fun and Informative Guide

3
Comments
10 min read
How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life

How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life

16
Comments 2
2 min read
Beyond the Cloud: How On-Device AI Could Rescue Our Privacy!?

Beyond the Cloud: How On-Device AI Could Rescue Our Privacy!?

10
Comments 1
2 min read
Role-based access control with Clerk Organizations

Role-based access control with Clerk Organizations

8
Comments 1
5 min read
Top Security Flaws hiding in your code right now - and how to fix them

Top Security Flaws hiding in your code right now - and how to fix them

1
Comments 2
8 min read
How to be a White Hat Hacker in Power Automate

How to be a White Hat Hacker in Power Automate

53
Comments 1
5 min read
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Comments
3 min read
Boost Your Network Security: Essential Hardening Techniques 🔒🛡️

Boost Your Network Security: Essential Hardening Techniques 🔒🛡️

2
Comments 2
2 min read
Issue 59 of AWS Cloud Security Weekly

Issue 59 of AWS Cloud Security Weekly

1
Comments
2 min read
Scanning AWS S3 Buckets for Security Vulnerabilities

Scanning AWS S3 Buckets for Security Vulnerabilities

3
Comments
12 min read
Securing API Endpoints: Best Practices for Protecting Your Data

Securing API Endpoints: Best Practices for Protecting Your Data

10
Comments 2
5 min read
You Don’t Have to Be a Victim

You Don’t Have to Be a Victim

1
Comments
6 min read
Spring Security 103: Exploring Default Security Configuration

Spring Security 103: Exploring Default Security Configuration

7
Comments
7 min read
How I Accidentally Became an Admin on 600 Servers

How I Accidentally Became an Admin on 600 Servers

4
Comments 1
4 min read
Introduction to Web Application Firewalls (WAF)

Introduction to Web Application Firewalls (WAF)

Comments
1 min read
A killer explanation of Secret-Key and Public-Key Cryptography

A killer explanation of Secret-Key and Public-Key Cryptography

Comments
4 min read
PREVENT YOUR BACKEND FROM SQL INJECTION

PREVENT YOUR BACKEND FROM SQL INJECTION

1
Comments 1
3 min read
Keyper by Jarrid: Introduce Integrated Key + Role Management

Keyper by Jarrid: Introduce Integrated Key + Role Management

1
Comments
3 min read
CRIANDO UM SERVIÇO DE AUTENTICAÇÃO EM PYTHON UTILIZANDO SALT

CRIANDO UM SERVIÇO DE AUTENTICAÇÃO EM PYTHON UTILIZANDO SALT

2
Comments
4 min read
loading...