DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Comments
3 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

4
Comments
2 min read
Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
This Month in Minder: September 2024

This Month in Minder: September 2024

3
Comments
1 min read
Easy way to geo-fence your cloud VPS with nftables

Easy way to geo-fence your cloud VPS with nftables

Comments 1
5 min read
AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

1
Comments 1
1 min read
Why should you upgrade your PostgreSQL today?

Why should you upgrade your PostgreSQL today?

1
Comments 1
3 min read
Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

1
Comments 1
4 min read
3G Cell Service Has a HUGE Security Flaw.

3G Cell Service Has a HUGE Security Flaw.

21
Comments 9
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

12
Comments
1 min read
Building a Password Manager in Go: Part 2

Building a Password Manager in Go: Part 2

10
Comments 1
3 min read
Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

1
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
From legacy to cloud serverless - Part 4

From legacy to cloud serverless - Part 4

Comments
7 min read
Enhance DigitalOcean with AWS-Level SSM and SSO Features

Enhance DigitalOcean with AWS-Level SSM and SSO Features

Comments
4 min read
Network Automization using AI.

Network Automization using AI.

Comments
6 min read
HIPAA Compliance Checklist For Healthcare Startups

HIPAA Compliance Checklist For Healthcare Startups

Comments
7 min read
How to publish custom cdk-nag rules and rule packs with Projen

How to publish custom cdk-nag rules and rule packs with Projen

5
Comments
6 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

1
Comments
3 min read
Stereotype of a Nigeria Hacker

Stereotype of a Nigeria Hacker

6
Comments 2
2 min read
Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

5
Comments
6 min read
Proxmox and NAS: Implementing VLANs for Network Isolation

Proxmox and NAS: Implementing VLANs for Network Isolation

Comments
4 min read
Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

5
Comments
16 min read
Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

1
Comments
3 min read
Is Authentication Just About What The Server And Client Know And Don't Know?

Is Authentication Just About What The Server And Client Know And Don't Know?

Comments
2 min read
Introduction to SSH setup

Introduction to SSH setup

Comments
4 min read
JWT at a Glance

JWT at a Glance

Comments
13 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

4
Comments
4 min read
Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

5
Comments 1
2 min read
Proteção em dispositivos móveis.

Proteção em dispositivos móveis.

Comments
2 min read
Data Validation Techniques

Data Validation Techniques

25
Comments
1 min read
Top 10 Tips with Code Examples: How to Secure Your C# Application

Top 10 Tips with Code Examples: How to Secure Your C# Application

10
Comments
3 min read
Re-rebuilding TF2.8 image: 369 patches

Re-rebuilding TF2.8 image: 369 patches

Comments
1 min read
Securing Rails application with Action Policy

Securing Rails application with Action Policy

Comments
4 min read
Security news weekly round-up - 20th September 2024

Security news weekly round-up - 20th September 2024

1
Comments
3 min read
Geolocation fun with Gemini

Geolocation fun with Gemini

2
Comments
7 min read
Secure API Key Handling in Python Projects

Secure API Key Handling in Python Projects

1
Comments
2 min read
CORS (Cross-Origin Resource Sharing) 🌐

CORS (Cross-Origin Resource Sharing) 🌐

Comments
9 min read
Flexible policy enforcement with Minder profile selectors

Flexible policy enforcement with Minder profile selectors

4
Comments
1 min read
The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

3
Comments
8 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

Comments
3 min read
Critical LLM Security Risks and Best Practices for Teams

Critical LLM Security Risks and Best Practices for Teams

38
Comments
8 min read
Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

5
Comments
5 min read
The Easiest Network Attack for Beginners: ARP Spoofing

The Easiest Network Attack for Beginners: ARP Spoofing

Comments
5 min read
Implement mTLS on AWS ALB with Self-Signed Certificates

Implement mTLS on AWS ALB with Self-Signed Certificates

7
Comments
5 min read
AuthenticationHandler in ASPNET

AuthenticationHandler in ASPNET

12
Comments 1
3 min read
Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Comments
5 min read
ACTING (like we care about) Security

ACTING (like we care about) Security

3
Comments
6 min read
Securing Data(Live event): A Guide to Microsoft DLP 🔒💻

Securing Data(Live event): A Guide to Microsoft DLP 🔒💻

Comments
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐

🌐 SSL Certificates and How to Implement Them in Your Website 🔐

1
Comments 1
3 min read
Admission Controllers in Kubernetes: OPA GateKeeper, Kyverno, and Azure Policy Add-on for AKS—Which One Wins? 🏆

Admission Controllers in Kubernetes: OPA GateKeeper, Kyverno, and Azure Policy Add-on for AKS—Which One Wins? 🏆

Comments
4 min read
AuthorizationEndpoint vs TokenEndpoint

AuthorizationEndpoint vs TokenEndpoint

3
Comments
3 min read
Breaking a TOTP?

Breaking a TOTP?

Comments
5 min read
loading...