DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 2

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 2

5
Comments 3
2 min read
Como expor seu localhost para teste em um cenário de desenvolvimento.

Como expor seu localhost para teste em um cenário de desenvolvimento.

25
Comments
3 min read
How to keep your Firebase project safe and secure from everyone

How to keep your Firebase project safe and secure from everyone

29
Comments 14
4 min read
How do YOU secure your remote database?

How do YOU secure your remote database?

5
Comments 1
1 min read
On .NET Episode: What is MSAL + Microsoft.Identity.Web?

On .NET Episode: What is MSAL + Microsoft.Identity.Web?

5
Comments
1 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

7
Comments
2 min read
Assinando commits com uma chave GPG

Assinando commits com uma chave GPG

33
Comments
3 min read
Hacking Django websites: session hijacking with XSS

Hacking Django websites: session hijacking with XSS

16
Comments
2 min read
Is web security broken?

Is web security broken?

6
Comments 11
1 min read
XSS doesn’t have to be game over

XSS doesn’t have to be game over

5
Comments
7 min read
Server Side Request Forgery Attack

Server Side Request Forgery Attack

13
Comments
1 min read
Shift-left Infrastructure Security

Shift-left Infrastructure Security

2
Comments
5 min read
Hacking Django websites: stealing cookies & passwords with packet sniffing

Hacking Django websites: stealing cookies & passwords with packet sniffing

16
Comments
3 min read
Governance with AWS Config

Governance with AWS Config

3
Comments
2 min read
Getting Started with AWS API Gateway

Getting Started with AWS API Gateway

17
Comments
8 min read
What is SGID in Linux?

What is SGID in Linux?

2
Comments
3 min read
What is IDaaS and Why Use One?

What is IDaaS and Why Use One?

21
Comments 1
2 min read
How to free up disk space on Ubuntu Server

How to free up disk space on Ubuntu Server

22
Comments 3
2 min read
JSON Web Token (JWT) and why we use them?

JSON Web Token (JWT) and why we use them?

16
Comments
7 min read
Using Your CI/CD Pipeline To Prevent Your App From Getting Hacked

Using Your CI/CD Pipeline To Prevent Your App From Getting Hacked

75
Comments 1
7 min read
Browser Communications

Browser Communications

36
Comments 3
8 min read
Implement a 'Password Reset' with JavaScript and Azure AD B2C

Implement a 'Password Reset' with JavaScript and Azure AD B2C

9
Comments 1
5 min read
Hacking Django websites: Man In The Middle attack

Hacking Django websites: Man In The Middle attack

32
Comments 1
3 min read
Exploiting network devices at the data link layer with Go

Exploiting network devices at the data link layer with Go

11
Comments
5 min read
Misleading CORS Errors

Misleading CORS Errors

2
Comments
4 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

13
Comments
4 min read
Passkb: how to reliably and securely bypass password paste blocking

Passkb: how to reliably and securely bypass password paste blocking

2
Comments 2
6 min read
Hacking Django websites: Cross Site Request Forgery Protection

Hacking Django websites: Cross Site Request Forgery Protection

20
Comments
2 min read
Enable HTTPS in LOCALHOST with OpenSSL for a NodeJS app🤓(with video)

Enable HTTPS in LOCALHOST with OpenSSL for a NodeJS app🤓(with video)

30
Comments 2
1 min read
Using a Cookie-to-Header CSRF Token in Single Page Applications

Using a Cookie-to-Header CSRF Token in Single Page Applications

122
Comments 7
6 min read
TryHackMe -CTF

TryHackMe -CTF

3
Comments
1 min read
SOP vs CORS?

SOP vs CORS?

11
Comments 1
4 min read
30D2R - June: Introduction to CTFs

30D2R - June: Introduction to CTFs

5
Comments
3 min read
Building a Home Test Server

Building a Home Test Server

23
Comments 1
11 min read
Hacking Django websites: clickjacking

Hacking Django websites: clickjacking

21
Comments
2 min read
Cyber Security Introduction (part 2: Phishing)

Cyber Security Introduction (part 2: Phishing)

17
Comments
4 min read
Security news weekly round-up - 11th December 2020

Security news weekly round-up - 11th December 2020

3
Comments
4 min read
OAuth is Not User Authorization

OAuth is Not User Authorization

6
Comments
6 min read
Hacking Django websites

Hacking Django websites

48
Comments 1
4 min read
AWS Certified Security: Specialty recap

AWS Certified Security: Specialty recap

9
Comments
4 min read
From Zero to Encyrpted Secrets in 2 Minutes with SOPS and GPG

From Zero to Encyrpted Secrets in 2 Minutes with SOPS and GPG

7
Comments
3 min read
Azure Event Grid series: Authenticate Webhook subscriptions

Azure Event Grid series: Authenticate Webhook subscriptions

13
Comments
4 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

41
Comments
3 min read
Smashing function pointers with buffer overflow(protostar - stack3)

Smashing function pointers with buffer overflow(protostar - stack3)

5
Comments
3 min read
IPFS File Encryption in NodeJS

IPFS File Encryption in NodeJS

9
Comments 2
2 min read
express-session failing with typescript (@types/express-session)

express-session failing with typescript (@types/express-session)

16
Comments 6
1 min read
JavaScript Security 101

JavaScript Security 101

100
Comments 6
5 min read
Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

12
Comments 1
1 min read
[Stacks 2020 CTF] Unlock Me - Web

[Stacks 2020 CTF] Unlock Me - Web

10
Comments
6 min read
How to secure API key by storing it as an environment variable in Netlify?

How to secure API key by storing it as an environment variable in Netlify?

7
Comments
2 min read
Honest Security

Honest Security

12
Comments 5
4 min read
Three Myths about Honest Security

Three Myths about Honest Security

11
Comments 1
5 min read
Hacking environment variables (protostar - stack2)

Hacking environment variables (protostar - stack2)

5
Comments
3 min read
P2P on steroids - Meet Surge

P2P on steroids - Meet Surge

8
Comments 2
1 min read
Firebase Security Rules

Firebase Security Rules

14
Comments
5 min read
How to completely secure an Ubuntu server

How to completely secure an Ubuntu server

115
Comments 2
5 min read
Learn cyber security: TryHackMe Advent Of Cyber

Learn cyber security: TryHackMe Advent Of Cyber

22
Comments
1 min read
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

2
Comments
4 min read
Stack overflow rules (protostar - stack0)

Stack overflow rules (protostar - stack0)

6
Comments 1
2 min read
Validating program arguments (Protostar - stack1)

Validating program arguments (Protostar - stack1)

5
Comments
4 min read
loading...