DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JSON Web Token (JWT) and why we use them?

JSON Web Token (JWT) and why we use them?

16
Comments
7 min read
Using Your CI/CD Pipeline To Prevent Your App From Getting Hacked

Using Your CI/CD Pipeline To Prevent Your App From Getting Hacked

75
Comments 1
7 min read
Browser Communications

Browser Communications

36
Comments 3
8 min read
Implement a 'Password Reset' with JavaScript and Azure AD B2C

Implement a 'Password Reset' with JavaScript and Azure AD B2C

9
Comments 1
5 min read
Hacking Django websites: Man In The Middle attack

Hacking Django websites: Man In The Middle attack

32
Comments 1
3 min read
Exploiting network devices at the data link layer with Go

Exploiting network devices at the data link layer with Go

11
Comments
5 min read
Misleading CORS Errors

Misleading CORS Errors

2
Comments
4 min read
Decoding the beauty of cryptography :

Decoding the beauty of cryptography :

13
Comments
4 min read
Passkb: how to reliably and securely bypass password paste blocking

Passkb: how to reliably and securely bypass password paste blocking

2
Comments 2
6 min read
Hacking Django websites: Cross Site Request Forgery Protection

Hacking Django websites: Cross Site Request Forgery Protection

20
Comments
2 min read
Enable HTTPS in LOCALHOST with OpenSSL for a NodeJS app🤓(with video)

Enable HTTPS in LOCALHOST with OpenSSL for a NodeJS app🤓(with video)

30
Comments 2
1 min read
Using a Cookie-to-Header CSRF Token in Single Page Applications

Using a Cookie-to-Header CSRF Token in Single Page Applications

122
Comments 7
6 min read
TryHackMe -CTF

TryHackMe -CTF

3
Comments
1 min read
SOP vs CORS?

SOP vs CORS?

11
Comments 1
4 min read
30D2R - June: Introduction to CTFs

30D2R - June: Introduction to CTFs

6
Comments
3 min read
Building a Home Test Server

Building a Home Test Server

23
Comments 1
11 min read
Hacking Django websites: clickjacking

Hacking Django websites: clickjacking

21
Comments
2 min read
Cyber Security Introduction (part 2: Phishing)

Cyber Security Introduction (part 2: Phishing)

17
Comments
4 min read
Security news weekly round-up - 11th December 2020

Security news weekly round-up - 11th December 2020

3
Comments
4 min read
OAuth is Not User Authorization

OAuth is Not User Authorization

6
Comments
6 min read
Hacking Django websites

Hacking Django websites

48
Comments 1
4 min read
AWS Certified Security: Specialty recap

AWS Certified Security: Specialty recap

9
Comments
4 min read
From Zero to Encyrpted Secrets in 2 Minutes with SOPS and GPG

From Zero to Encyrpted Secrets in 2 Minutes with SOPS and GPG

7
Comments
3 min read
Azure Event Grid series: Authenticate Webhook subscriptions

Azure Event Grid series: Authenticate Webhook subscriptions

13
Comments
4 min read
Cyber Security Introduction (part 1)

Cyber Security Introduction (part 1)

41
Comments
3 min read
Smashing function pointers with buffer overflow(protostar - stack3)

Smashing function pointers with buffer overflow(protostar - stack3)

5
Comments
3 min read
IPFS File Encryption in NodeJS

IPFS File Encryption in NodeJS

9
Comments 2
2 min read
express-session failing with typescript (@types/express-session)

express-session failing with typescript (@types/express-session)

16
Comments 6
1 min read
JavaScript Security 101

JavaScript Security 101

100
Comments 6
5 min read
Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

Man-In-The-Middle (MITM) Attack: Types, Techniques And Prevention

12
Comments 1
1 min read
[Stacks 2020 CTF] Unlock Me - Web

[Stacks 2020 CTF] Unlock Me - Web

10
Comments
6 min read
How to secure API key by storing it as an environment variable in Netlify?

How to secure API key by storing it as an environment variable in Netlify?

7
Comments
2 min read
Honest Security

Honest Security

12
Comments 5
4 min read
Three Myths about Honest Security

Three Myths about Honest Security

11
Comments 1
5 min read
Hacking environment variables (protostar - stack2)

Hacking environment variables (protostar - stack2)

5
Comments
3 min read
P2P on steroids - Meet Surge

P2P on steroids - Meet Surge

8
Comments 2
1 min read
Firebase Security Rules

Firebase Security Rules

14
Comments
5 min read
How to completely secure an Ubuntu server

How to completely secure an Ubuntu server

115
Comments 2
5 min read
Learn cyber security: TryHackMe Advent Of Cyber

Learn cyber security: TryHackMe Advent Of Cyber

22
Comments
1 min read
Asymmetric Cryptography: Signing VS Encrypting

Asymmetric Cryptography: Signing VS Encrypting

2
Comments
4 min read
Stack overflow rules (protostar - stack0)

Stack overflow rules (protostar - stack0)

6
Comments 1
2 min read
Validating program arguments (Protostar - stack1)

Validating program arguments (Protostar - stack1)

5
Comments
4 min read
How to Build HTML Forms Right: Security

How to Build HTML Forms Right: Security

112
Comments 4
21 min read
A stateless token case study: Algolia search API

A stateless token case study: Algolia search API

9
Comments
4 min read
Authorization, Authentication of apps and APIs made easy with Auth0

Authorization, Authentication of apps and APIs made easy with Auth0

39
Comments 1
2 min read
SQL Injection

SQL Injection

4
Comments
2 min read
How To Generate & Install SSL Certificate In Apache Web Server On Ubuntu

How To Generate & Install SSL Certificate In Apache Web Server On Ubuntu

4
Comments
5 min read
How to Password Protect a Website or Web SubDirectory With .htaccess & .htpasswd

How to Password Protect a Website or Web SubDirectory With .htaccess & .htpasswd

3
Comments
2 min read
Getting Started with Kubernetes: A Brief Introduction to Kubernetes Pod Security Policies

Getting Started with Kubernetes: A Brief Introduction to Kubernetes Pod Security Policies

18
Comments
6 min read
How to access your AWS account

How to access your AWS account

22
Comments
9 min read
Security news weekly round-up - 4th December 2020

Security news weekly round-up - 4th December 2020

7
Comments
3 min read
Evite subir chaves de API para o GitHub em seu projeto Android, veja como.

Evite subir chaves de API para o GitHub em seu projeto Android, veja como.

10
Comments
5 min read
PCI DSS Requirements and Tips on Compliance

PCI DSS Requirements and Tips on Compliance

10
Comments 1
7 min read
Anchore Policy Enforcement with Travis CI

Anchore Policy Enforcement with Travis CI

6
Comments
3 min read
[Podcast] Barcoding podcast - Episode 13: Security

[Podcast] Barcoding podcast - Episode 13: Security

4
Comments
1 min read
Protecting audio assets with JavaScript and Web Audio API

Protecting audio assets with JavaScript and Web Audio API

31
Comments 2
3 min read
How IAM Solution Implementation Help Overcome IT Security Challenges

How IAM Solution Implementation Help Overcome IT Security Challenges

3
Comments
3 min read
Avoid uploading API keys and other sensitive info to GitHub on Android, here's how.

Avoid uploading API keys and other sensitive info to GitHub on Android, here's how.

11
Comments
4 min read
Protecting audio and music assets with Node and Javascript

Protecting audio and music assets with Node and Javascript

48
Comments 2
3 min read
How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

17
Comments 2
6 min read
loading...