DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
GraphQL is not meant to be exposed over the internet

GraphQL is not meant to be exposed over the internet

3
Comments
8 min read
NodeJS malware caught exfiltrating IPs, username, and device information on GitHub

NodeJS malware caught exfiltrating IPs, username, and device information on GitHub

6
Comments
2 min read
Handling Token Authentication in Vue 3

Handling Token Authentication in Vue 3

7
Comments
5 min read
Thread - DevSecOps Automation on GitHub Thread - Part 1

Thread - DevSecOps Automation on GitHub Thread - Part 1

5
Comments
2 min read
My anti-spam API product stopped over 1M spam with %99 accuracy, and here are things I learned

My anti-spam API product stopped over 1M spam with %99 accuracy, and here are things I learned

5
Comments
4 min read
5 Key Learnings From Working With JWTs

5 Key Learnings From Working With JWTs

9
Comments
5 min read
Detecting and Blocking Vulnerable Curl Requests From Your Users

Detecting and Blocking Vulnerable Curl Requests From Your Users

6
Comments
4 min read
Mimic mobile password input with React

Mimic mobile password input with React

6
Comments
2 min read
What is the Firewall?

What is the Firewall?

3
Comments
1 min read
Web security knowledge you must understand it (Part I: HTTPS, TLS, SSL, CORS, CSP)

Web security knowledge you must understand it (Part I: HTTPS, TLS, SSL, CORS, CSP)

960
Comments 33
5 min read
Is sudo just sudoly safe?

Is sudo just sudoly safe?

6
Comments 5
1 min read
In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

8
Comments
11 min read
Securely accessing MS Graph from gRPC .NET with Azure AD

Securely accessing MS Graph from gRPC .NET with Azure AD

8
Comments
6 min read
How to Manage Your Secrets with git-crypt

How to Manage Your Secrets with git-crypt

76
Comments 2
9 min read
Protecting your Github workflows

Protecting your Github workflows

10
Comments
3 min read
Learning pentesting path

Learning pentesting path

6
Comments
1 min read
🔐 Full HTTPS development environment

🔐 Full HTTPS development environment

43
Comments 2
5 min read
Never Trust User Input

Never Trust User Input

6
Comments 4
3 min read
Tips to prevent spam ☔️

Tips to prevent spam ☔️

27
Comments 2
3 min read
Retrieving all tagged resources with PowerShell, Azure Functions and Managed Identity

Retrieving all tagged resources with PowerShell, Azure Functions and Managed Identity

10
Comments
5 min read
How to update child npm modules to fix vulnerabilities

How to update child npm modules to fix vulnerabilities

6
Comments
2 min read
🐯 Local HTTPS for NestJS app (api) in Nx workspace

🐯 Local HTTPS for NestJS app (api) in Nx workspace

11
Comments
3 min read
⚛️ Local HTTPS for React app in Nx workspace

⚛️ Local HTTPS for React app in Nx workspace

11
Comments 1
3 min read
⏩ Local HTTPS for Express app (api) in Nx workspace

⏩ Local HTTPS for Express app (api) in Nx workspace

7
Comments
3 min read
🅰️ Local HTTPS for Angular app in Nx workspace (or angular cli)

🅰️ Local HTTPS for Angular app in Nx workspace (or angular cli)

7
Comments 1
3 min read
3 lessons I learned as a Cybersecurity Analyst

3 lessons I learned as a Cybersecurity Analyst

8
Comments
4 min read
Bitwarden: use the most convenient 2FA while staying reasonably safe

Bitwarden: use the most convenient 2FA while staying reasonably safe

28
Comments 4
6 min read
Pentesting Android Apps Using "Frida and Objection"

Pentesting Android Apps Using "Frida and Objection"

3
Comments 1
1 min read
Network ACL vs Security Groups

Network ACL vs Security Groups

7
Comments
1 min read
How hackers steal your keys and secrets

How hackers steal your keys and secrets

434
Comments 33
11 min read
Different ways to authenticate your APIs

Different ways to authenticate your APIs

106
Comments 1
5 min read
How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

5
Comments
4 min read
Port Knocking (Network Security Technique) Explained and Demoed in 5 Minutes!

Port Knocking (Network Security Technique) Explained and Demoed in 5 Minutes!

5
Comments
1 min read
Validating and Sanitizing user inputs on python projects REST api

Validating and Sanitizing user inputs on python projects REST api

17
Comments 2
2 min read
Let's stop being stupid about security

Let's stop being stupid about security

5
Comments
4 min read
How to Learn InfoSec and Hacking through Structured Levels

How to Learn InfoSec and Hacking through Structured Levels

134
Comments 3
5 min read
Temporary Private Message

Temporary Private Message

72
Comments 6
2 min read
Basic Security For Your Brand New Server

Basic Security For Your Brand New Server

8
Comments
3 min read
A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

4
Comments
5 min read
Signing and Validating JSON Web Tokens (JWT) For Everyone

Signing and Validating JSON Web Tokens (JWT) For Everyone

141
Comments 16
10 min read
What is Cyber Security

What is Cyber Security

7
Comments
2 min read
Node.js Resiliency Concepts: Recovery and Self-Healing

Node.js Resiliency Concepts: Recovery and Self-Healing

61
Comments
17 min read
Dockerfile Security Best Practices

Dockerfile Security Best Practices

9
Comments
5 min read
A visual introduction to AWS Lambda permissions

A visual introduction to AWS Lambda permissions

48
Comments 2
8 min read
Message Integrity, Authentication, and Non-Repudiation

Message Integrity, Authentication, and Non-Repudiation

6
Comments
4 min read
The Aura App & Physical ERD's: Getting Things in Order

The Aura App & Physical ERD's: Getting Things in Order

2
Comments
3 min read
Using JWT Token/Cookie based session authentication — Potential Identity Theft & Data Exploitation

Using JWT Token/Cookie based session authentication — Potential Identity Theft & Data Exploitation

2
Comments 3
2 min read
COMO CRIAR UMA SENHA SEGURA

COMO CRIAR UMA SENHA SEGURA

2
Comments
3 min read
What is a JWT token

What is a JWT token

44
Comments 4
3 min read
Generating pentest reports with Reconmap

Generating pentest reports with Reconmap

6
Comments
3 min read
To improve good security practices

To improve good security practices

7
Comments
1 min read
A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

11
Comments
2 min read
GitHub Thrilled : Code scanning is now available!

GitHub Thrilled : Code scanning is now available!

12
Comments
1 min read
Microsoft September 2020 Patch Tuesday

Microsoft September 2020 Patch Tuesday

3
Comments
2 min read
Making Sense of the SOAR Cybersecurity Product Space

Making Sense of the SOAR Cybersecurity Product Space

2
Comments
7 min read
Adding SSL to our Azure Node app

Adding SSL to our Azure Node app

11
Comments
4 min read
CLAD Model for Serverless Security

CLAD Model for Serverless Security

26
Comments
11 min read
Node Package Manager (NPM) Audit and what that means!

Node Package Manager (NPM) Audit and what that means!

3
Comments
3 min read
CrowdSec, an open-source, modernized & collaborative Fail2ban

CrowdSec, an open-source, modernized & collaborative Fail2ban

37
Comments 8
3 min read
How to hide secrets in an image using Python

How to hide secrets in an image using Python

10
Comments
3 min read
loading...