DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Awesome Frontend Security

Awesome Frontend Security

9
Comments
1 min read
10 steps for securing a PHP app

10 steps for securing a PHP app

137
Comments 7
3 min read
Is a Master's Degree Worth It?

Is a Master's Degree Worth It?

12
Comments 5
5 min read
Why Opera Browser is Using Webcam?

Why Opera Browser is Using Webcam?

9
Comments 5
1 min read
My First CTF Writeup : KPMG Cyber Security Challenge 2019

My First CTF Writeup : KPMG Cyber Security Challenge 2019

18
Comments
5 min read
How To Stop Account Hijacking

How To Stop Account Hijacking

7
Comments
3 min read
Introducing Aberrant Authentication

Introducing Aberrant Authentication

7
Comments
2 min read
Best practices for Kubernetes security; scaling write-heavy productions; & SRE

Best practices for Kubernetes security; scaling write-heavy productions; & SRE

22
Comments
2 min read
Jenkins: SAML, Okta, user groups, and Role-Based Security plugin

Jenkins: SAML, Okta, user groups, and Role-Based Security plugin

6
Comments 1
5 min read
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

8
Comments 1
1 min read
Ruby Dotenv

Ruby Dotenv

9
Comments 2
2 min read
Virtualization for Practical Local Security

Virtualization for Practical Local Security

9
Comments
8 min read
OpenVPN: the No route to host and ERR_ADDRESS_UNREACHABLE errors – the cause and a solution

OpenVPN: the No route to host and ERR_ADDRESS_UNREACHABLE errors – the cause and a solution

6
Comments
3 min read
Security Testing using BDD Security

Security Testing using BDD Security

9
Comments
2 min read
NestJS authentication for server side rendering with Handlebars

NestJS authentication for server side rendering with Handlebars

5
Comments
4 min read
ULID in GO Lang

ULID in GO Lang

3
Comments
1 min read
Firestore Rules Examples – Must-Know Patterns To Secure Your Data

Firestore Rules Examples – Must-Know Patterns To Secure Your Data

17
Comments 7
4 min read
Ghidra Scripting: Annotating Linux system calls

Ghidra Scripting: Annotating Linux system calls

8
Comments
3 min read
Token vs Session Authentication

Token vs Session Authentication

148
Comments 11
2 min read
Security audit for your online devices

Security audit for your online devices

4
Comments
1 min read
Did your WordPress site get hacked? Find out what to do next!

Did your WordPress site get hacked? Find out what to do next!

6
Comments
10 min read
Getting started with WebAuthn - The basic flow

Getting started with WebAuthn - The basic flow

9
Comments
11 min read
Jenkins: SAML Authentication with Okta and users groups

Jenkins: SAML Authentication with Okta and users groups

7
Comments 1
7 min read
"Sign in with Apple" implementation hurdles

"Sign in with Apple" implementation hurdles

16
Comments 2
9 min read
Oh, The Hats You'll Wear

Oh, The Hats You'll Wear

15
Comments
6 min read
Setting up Let's Encrypt with NGINX on Ubuntu

Setting up Let's Encrypt with NGINX on Ubuntu

11
Comments 1
3 min read
Here's why podman is more secured than Docker - DevSecOps

Here's why podman is more secured than Docker - DevSecOps

12
Comments
6 min read
Hack the wires

Hack the wires

26
Comments
3 min read
SQRL Poised To Save Us From Password Hell

SQRL Poised To Save Us From Password Hell

22
Comments 3
6 min read
The Development Trifecta: Three Questions Developers Should Be Asking Themselves All the Time

The Development Trifecta: Three Questions Developers Should Be Asking Themselves All the Time

9
Comments 1
4 min read
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

6
Comments
2 min read
Personal cybersecurity posture for when you're just this guy, you know?

Personal cybersecurity posture for when you're just this guy, you know?

81
Comments 15
7 min read
Let's Encrypt: Renew Wildcard Certificate With Certbot

Let's Encrypt: Renew Wildcard Certificate With Certbot

25
Comments 13
2 min read
AJAX History & Modern Security

AJAX History & Modern Security

56
Comments 3
4 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
The Top 6 Mobile API Protection Techniques - Are They Enough?

The Top 6 Mobile API Protection Techniques - Are They Enough?

34
Comments
12 min read
This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

7
Comments 5
2 min read
Engaging in OverTheWire's Wargames

Engaging in OverTheWire's Wargames

12
Comments 1
3 min read
Building towards a web without passwords

Building towards a web without passwords

21
Comments 1
5 min read
Signed Git commits in VS Code

Signed Git commits in VS Code

203
Comments 32
5 min read
Root-Me - Xor Madness - Walkthrough

Root-Me - Xor Madness - Walkthrough

7
Comments
3 min read
Attackers exploit 0day vulnerability that gives full control of Android phones

Attackers exploit 0day vulnerability that gives full control of Android phones

6
Comments 2
2 min read
Simple Intro to JWT Basics

Simple Intro to JWT Basics

198
Comments 8
8 min read
Secure application architecture basics: separation, configuration, and access

Secure application architecture basics: separation, configuration, and access

134
Comments 3
7 min read
Part 2: Classic Encryption Algorithms - Mono-alphabetic Substitution Ciphers

Part 2: Classic Encryption Algorithms - Mono-alphabetic Substitution Ciphers

8
Comments
12 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

36
Comments 1
9 min read
The iOS Checkm8 jailbreak is hugely significant, but not for you

The iOS Checkm8 jailbreak is hugely significant, but not for you

5
Comments
1 min read
Is your Mobile App Leaking Secrets?

Is your Mobile App Leaking Secrets?

15
Comments 4
4 min read
Fixing version not approved on Habitica-Chat-Extension (FireFox)

Fixing version not approved on Habitica-Chat-Extension (FireFox)

6
Comments
4 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

11
Comments
2 min read
Part 1: Introduction to Cryptography

Part 1: Introduction to Cryptography

19
Comments 2
6 min read
Okta: SSO authentication for Gmail and Slack

Okta: SSO authentication for Gmail and Slack

8
Comments
3 min read
Sending your Threat Indicators to Azure Sentinel

Sending your Threat Indicators to Azure Sentinel

6
Comments
5 min read
Creepin' with Maltego

Creepin' with Maltego

8
Comments
3 min read
Unfixable iOS Vulnerability Affects 7 Generations of Devices

Unfixable iOS Vulnerability Affects 7 Generations of Devices

25
Comments 2
2 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

20
Comments
3 min read
Add Sec to your DevOps Pipeline with Checkmarx

Add Sec to your DevOps Pipeline with Checkmarx

14
Comments
4 min read
Azure Functions Security: Best Practices

Azure Functions Security: Best Practices

22
Comments
9 min read
What do you use for password management?

What do you use for password management?

85
Comments 152
1 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
loading...