DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Authenticating APIs with Cognito

Authenticating APIs with Cognito

4
Comments
2 min read
If you’re not using SSH certificates you’re doing SSH wrong | Episode 2: Certificates improve usability, operability, & security

If you’re not using SSH certificates you’re doing SSH wrong | Episode 2: Certificates improve usability, operability, & security

111
Comments 4
6 min read
Randomness, what did you expect ?

Randomness, what did you expect ?

10
Comments 2
8 min read
Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

3
Comments 1
3 min read
Diana Initiative CTF

Diana Initiative CTF

8
Comments
7 min read
Azure Architecture Scenario: Protect an Azure App Service with a Cloud Hosted WAF (DNS Based)

Azure Architecture Scenario: Protect an Azure App Service with a Cloud Hosted WAF (DNS Based)

6
Comments
4 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

3
Comments
14 min read
If you’re not using SSH certificates you’re doing SSH wrong | Episode 1: Keys versus Certificates

If you’re not using SSH certificates you’re doing SSH wrong | Episode 1: Keys versus Certificates

37
Comments
5 min read
If you’re not using SSH certificates you’re doing SSH wrong | Episode 3: An ideal SSH flow

If you’re not using SSH certificates you’re doing SSH wrong | Episode 3: An ideal SSH flow

31
Comments 2
5 min read
Using sub-accounts in AWS

Using sub-accounts in AWS

5
Comments
4 min read
Secure gRPC service with .NET Core and Azure Active Directory

Secure gRPC service with .NET Core and Azure Active Directory

14
Comments
6 min read
My Favorite Privacy Tools in 2020: Be Safer on the Internet!

My Favorite Privacy Tools in 2020: Be Safer on the Internet!

123
Comments 21
3 min read
I created the official MLH Fellowhip CTF competition as a fellow

I created the official MLH Fellowhip CTF competition as a fellow

25
Comments 1
4 min read
Dev tools for databases, what is out there?

Dev tools for databases, what is out there?

17
Comments 5
1 min read
Disable SSL certificate validation in Spring RestTemplate

Disable SSL certificate validation in Spring RestTemplate

19
Comments 2
2 min read
noopener, noreferrer, and nofollow - When to use them? How can these prevent Phishing Attacks?

noopener, noreferrer, and nofollow - When to use them? How can these prevent Phishing Attacks?

11
Comments
6 min read
Linux Socket Monitoring

Linux Socket Monitoring

4
Comments
2 min read
JS-X-Ray 2.0

JS-X-Ray 2.0

8
Comments
5 min read
Django JWT Auth

Django JWT Auth

4
Comments
4 min read
HIPAA Compliant Mobile Apps With Ionic

HIPAA Compliant Mobile Apps With Ionic

13
Comments 1
4 min read
Rodauth: A Refreshing Authentication Solution for Ruby

Rodauth: A Refreshing Authentication Solution for Ruby

13
Comments
14 min read
Working with Proof Key for Code Exchange (PKCE)

Working with Proof Key for Code Exchange (PKCE)

36
Comments 1
7 min read
Secure code review: Bonus - Who reviews the code?

Secure code review: Bonus - Who reviews the code?

7
Comments
2 min read
How should you secure your API token?

How should you secure your API token?

3
Comments
6 min read
🚀 How to add Themis crypto-library to your app with 1 line of code

🚀 How to add Themis crypto-library to your app with 1 line of code

6
Comments
2 min read
Setting up mTLS and Kestrel (cont.)

Setting up mTLS and Kestrel (cont.)

6
Comments
7 min read
Do airplanes still use floppy disks for updates? Why?

Do airplanes still use floppy disks for updates? Why?

2
Comments
7 min read
Secure code review: Part 8 - Statically testing

Secure code review: Part 8 - Statically testing

5
Comments
2 min read
Introduction to Kerberos

Introduction to Kerberos

9
Comments 1
5 min read
Exploring Certificates

Exploring Certificates

8
Comments
4 min read
[DevSecOPS] #6 見える化を行ったら(DBサーバ編)

[DevSecOPS] #6 見える化を行ったら(DBサーバ編)

5
Comments
1 min read
LocalStorage vs Cookies: All You Need To Know About Storing JWT Tokens Securely in The Front-End

LocalStorage vs Cookies: All You Need To Know About Storing JWT Tokens Securely in The Front-End

727
Comments 46
7 min read
Secure code review: Part 7 - Well-known attacks

Secure code review: Part 7 - Well-known attacks

5
Comments
3 min read
Setting up Auth Routes with Express

Setting up Auth Routes with Express

38
Comments
7 min read
What is a Web Application Firewall? Explained with Example

What is a Web Application Firewall? Explained with Example

7
Comments 1
1 min read
[DevSecOPS] #5 見える化を行ったら(APサーバ編)

[DevSecOPS] #5 見える化を行ったら(APサーバ編)

7
Comments
2 min read
Secure code review: Part 6 - Handling sensitive data

Secure code review: Part 6 - Handling sensitive data

8
Comments
3 min read
Creating and using AWS Secrets from the CLI and CDK

Creating and using AWS Secrets from the CLI and CDK

5
Comments
3 min read
Gitcoin + Chainlink: Bug Bounty Program

Gitcoin + Chainlink: Bug Bounty Program

3
Comments
2 min read
Security news weekly round-up - 14th August 2020

Security news weekly round-up - 14th August 2020

6
Comments
3 min read
🔗 Static IPs for AWS Lambdas

🔗 Static IPs for AWS Lambdas

8
Comments
3 min read
Secure code review: Part 5 - Least privilege principle

Secure code review: Part 5 - Least privilege principle

11
Comments
2 min read
Secure ASP.NET Blazor WASM apps and APIs with Azure AD B2C

Secure ASP.NET Blazor WASM apps and APIs with Azure AD B2C

14
Comments 25
10 min read
Engineering safer and more secure solutions for digital identity and access management with Rust

Engineering safer and more secure solutions for digital identity and access management with Rust

5
Comments
4 min read
Creating and using an SSH key pair on Windows

Creating and using an SSH key pair on Windows

2
Comments 1
4 min read
I Was Nominated Hacker Noon Contributor of the Year - SECURITY

I Was Nominated Hacker Noon Contributor of the Year - SECURITY

12
Comments
1 min read
Proxy in short

Proxy in short

7
Comments 3
2 min read
[Segurança da Informação] Ataques, conceitos e técnicas

[Segurança da Informação] Ataques, conceitos e técnicas

6
Comments
4 min read
Resolve NPM security vulnerabilities

Resolve NPM security vulnerabilities

6
Comments 2
2 min read
Secure code review: Part 4 - Enforce secure authentication

Secure code review: Part 4 - Enforce secure authentication

2
Comments
2 min read
Rainbow Tables & Why To Add Salt

Rainbow Tables & Why To Add Salt

11
Comments 1
4 min read
Protecting Your Apps From Link-based Vulnerabilities: Reverse Tabnabbing, Broken-Link Hijacking, and Open Redirects

Protecting Your Apps From Link-based Vulnerabilities: Reverse Tabnabbing, Broken-Link Hijacking, and Open Redirects

23
Comments
10 min read
Secure code review: Part 3 - Test for vulnerabilities introduced by dependencies

Secure code review: Part 3 - Test for vulnerabilities introduced by dependencies

4
Comments
2 min read
Creating an Authorization Plugin for Apollo Server

Creating an Authorization Plugin for Apollo Server

5
Comments
6 min read
Cookie-based Spring Security Session

Cookie-based Spring Security Session

5
Comments
1 min read
Secure code review: Part 2 - Never store secrets as code

Secure code review: Part 2 - Never store secrets as code

5
Comments
2 min read
AppAuth JS integration in React

AppAuth JS integration in React

10
Comments 6
5 min read
Keep index.php in your public folder

Keep index.php in your public folder

3
Comments 1
1 min read
Secure code review: Part 1 - Sanitize and validate all input

Secure code review: Part 1 - Sanitize and validate all input

21
Comments
2 min read
Make a Secure Browser?

Make a Secure Browser?

6
Comments 10
1 min read
loading...