DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Privacy and Ethical Web Analytics

Privacy and Ethical Web Analytics

4
Comments
4 min read
stegbrute - Fast Steganography brute-force tool

stegbrute - Fast Steganography brute-force tool

9
Comments
3 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

7
Comments
8 min read
Basic Authentication with Lambda@Edge

Basic Authentication with Lambda@Edge

34
Comments 5
3 min read
Choosing the right access control strategy

Choosing the right access control strategy

14
Comments
7 min read
The user authentication deserve more attention

The user authentication deserve more attention

2
Comments 1
1 min read
Generating Django QuerySet filters from oso policies

Generating Django QuerySet filters from oso policies

2
Comments
1 min read
Anonymity of Bitcoin by mixing

Anonymity of Bitcoin by mixing

2
Comments
3 min read
How Stripe is actioning the osquery API at scale [osquery@scale]

How Stripe is actioning the osquery API at scale [osquery@scale]

2
Comments
2 min read
Security news weekly round-up - 16th October 2020

Security news weekly round-up - 16th October 2020

2
Comments
3 min read
We Need To Talk About API Security

We Need To Talk About API Security

71
Comments 9
6 min read
End-to-End Encrypted Chat with the Web Crypto API

End-to-End Encrypted Chat with the Web Crypto API

255
Comments 19
9 min read
Check out my new project!

Check out my new project!

3
Comments
1 min read
Spam sucks

Spam sucks

139
Comments 38
2 min read
Crack WPA/WPA2 Wi-fi Password

Crack WPA/WPA2 Wi-fi Password

7
Comments 1
5 min read
5 things you should do right now to secure SSH access to your server

5 things you should do right now to secure SSH access to your server

21
Comments
4 min read
Cryptography for programmers 3: Hashes, MACs & JWT

Cryptography for programmers 3: Hashes, MACs & JWT

28
Comments 6
9 min read
GraphQL in Production with Hasura Cloud

GraphQL in Production with Hasura Cloud

5
Comments
11 min read
Code security: evaluation of the new Github code scanning function

Code security: evaluation of the new Github code scanning function

8
Comments 2
4 min read
Simple and Secure Web Login with Azure Identity

Simple and Secure Web Login with Azure Identity

8
Comments
2 min read
GraphQL is not meant to be exposed over the internet

GraphQL is not meant to be exposed over the internet

3
Comments
8 min read
NodeJS malware caught exfiltrating IPs, username, and device information on GitHub

NodeJS malware caught exfiltrating IPs, username, and device information on GitHub

6
Comments
2 min read
Handling Token Authentication in Vue 3

Handling Token Authentication in Vue 3

7
Comments
5 min read
Thread - DevSecOps Automation on GitHub Thread - Part 1

Thread - DevSecOps Automation on GitHub Thread - Part 1

5
Comments
2 min read
5 Key Learnings From Working With JWTs

5 Key Learnings From Working With JWTs

9
Comments
5 min read
My anti-spam API product stopped over 1M spam with %99 accuracy, and here are things I learned

My anti-spam API product stopped over 1M spam with %99 accuracy, and here are things I learned

5
Comments
4 min read
Detecting and Blocking Vulnerable Curl Requests From Your Users

Detecting and Blocking Vulnerable Curl Requests From Your Users

6
Comments
4 min read
Mimic mobile password input with React

Mimic mobile password input with React

6
Comments
2 min read
What is the Firewall?

What is the Firewall?

3
Comments
1 min read
Web security knowledge you must understand it (Part I: HTTPS, TLS, SSL, CORS, CSP)

Web security knowledge you must understand it (Part I: HTTPS, TLS, SSL, CORS, CSP)

960
Comments 33
5 min read
Is sudo just sudoly safe?

Is sudo just sudoly safe?

6
Comments 5
1 min read
In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

8
Comments
11 min read
Securely accessing MS Graph from gRPC .NET with Azure AD

Securely accessing MS Graph from gRPC .NET with Azure AD

8
Comments
6 min read
How to Manage Your Secrets with git-crypt

How to Manage Your Secrets with git-crypt

75
Comments 2
9 min read
Protecting your Github workflows

Protecting your Github workflows

10
Comments
3 min read
Learning pentesting path

Learning pentesting path

6
Comments
1 min read
🔐 Full HTTPS development environment

🔐 Full HTTPS development environment

43
Comments 2
5 min read
Never Trust User Input

Never Trust User Input

6
Comments 4
3 min read
Tips to prevent spam ☔️

Tips to prevent spam ☔️

27
Comments 2
3 min read
Retrieving all tagged resources with PowerShell, Azure Functions and Managed Identity

Retrieving all tagged resources with PowerShell, Azure Functions and Managed Identity

10
Comments
5 min read
How to update child npm modules to fix vulnerabilities

How to update child npm modules to fix vulnerabilities

6
Comments
2 min read
⚛️ Local HTTPS for React app in Nx workspace

⚛️ Local HTTPS for React app in Nx workspace

11
Comments 1
3 min read
🐯 Local HTTPS for NestJS app (api) in Nx workspace

🐯 Local HTTPS for NestJS app (api) in Nx workspace

11
Comments
3 min read
⏩ Local HTTPS for Express app (api) in Nx workspace

⏩ Local HTTPS for Express app (api) in Nx workspace

7
Comments
3 min read
🅰️ Local HTTPS for Angular app in Nx workspace (or angular cli)

🅰️ Local HTTPS for Angular app in Nx workspace (or angular cli)

7
Comments 1
3 min read
3 lessons I learned as a Cybersecurity Analyst

3 lessons I learned as a Cybersecurity Analyst

8
Comments
4 min read
Bitwarden: use the most convenient 2FA while staying reasonably safe

Bitwarden: use the most convenient 2FA while staying reasonably safe

28
Comments 4
6 min read
Pentesting Android Apps Using "Frida and Objection"

Pentesting Android Apps Using "Frida and Objection"

3
Comments 1
1 min read
Network ACL vs Security Groups

Network ACL vs Security Groups

7
Comments
1 min read
How hackers steal your keys and secrets

How hackers steal your keys and secrets

434
Comments 33
11 min read
Different ways to authenticate your APIs

Different ways to authenticate your APIs

106
Comments 1
5 min read
How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

5
Comments
4 min read
Port Knocking (Network Security Technique) Explained and Demoed in 5 Minutes!

Port Knocking (Network Security Technique) Explained and Demoed in 5 Minutes!

5
Comments
1 min read
Validating and Sanitizing user inputs on python projects REST api

Validating and Sanitizing user inputs on python projects REST api

17
Comments 2
2 min read
Let's stop being stupid about security

Let's stop being stupid about security

5
Comments
4 min read
How to Learn InfoSec and Hacking through Structured Levels

How to Learn InfoSec and Hacking through Structured Levels

134
Comments 3
5 min read
Temporary Private Message

Temporary Private Message

72
Comments 6
2 min read
Basic Security For Your Brand New Server

Basic Security For Your Brand New Server

8
Comments
3 min read
A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

4
Comments
5 min read
Signing and Validating JSON Web Tokens (JWT) For Everyone

Signing and Validating JSON Web Tokens (JWT) For Everyone

139
Comments 16
10 min read
loading...