DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fighting procrastination by (re)joining hackthebox

Fighting procrastination by (re)joining hackthebox

7
Comments
3 min read
Clickjacking Using Iframes: A Case Study đź‘€

Clickjacking Using Iframes: A Case Study đź‘€

8
Comments 1
9 min read
How to protect your Django Secret and OAuth Keys [2024 revised]

How to protect your Django Secret and OAuth Keys [2024 revised]

47
Comments 22
2 min read
Looking inside Go - Reverse Engineering

Looking inside Go - Reverse Engineering

10
Comments
7 min read
(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

(Part 1) Simplified: Hierarchical Deterministic (HD) Wallets

7
Comments
7 min read
Total Commander Password Recovery

Total Commander Password Recovery

7
Comments 2
2 min read
Don’t play stupid with the security of your app

Don’t play stupid with the security of your app

5
Comments
2 min read
I don't know where to start with hacking

I don't know where to start with hacking

5
Comments 1
3 min read
Security news weekly round-up - 17th July 2020

Security news weekly round-up - 17th July 2020

4
Comments
4 min read
GitHub vulnerability reports are also notified on my abandoned repos

GitHub vulnerability reports are also notified on my abandoned repos

2
Comments
1 min read
Laravel Lighthouse Sanctum role based authorization best practices

Laravel Lighthouse Sanctum role based authorization best practices

4
Comments
1 min read
Formulating a DevRel Strategy for your Early-Stage Startup

Formulating a DevRel Strategy for your Early-Stage Startup

10
Comments
3 min read
ClamAV releases 0.102.4 Security patch

ClamAV releases 0.102.4 Security patch

3
Comments
2 min read
4 Essential Steps to Securing a VPS

4 Essential Steps to Securing a VPS

15
Comments 3
8 min read
6 essential tools you should know before launching your website

6 essential tools you should know before launching your website

405
Comments 7
2 min read
Building a culture of security in open source software development

Building a culture of security in open source software development

26
Comments 1
8 min read
Is Zoom doomed?

Is Zoom doomed?

58
Comments 35
1 min read
Should You Use Password Authentication?

Should You Use Password Authentication?

31
Comments 9
5 min read
encodeURIComponent is both not safe enough, and overdone

encodeURIComponent is both not safe enough, and overdone

9
Comments
1 min read
How to protect your JS ?

How to protect your JS ?

5
Comments 11
1 min read
Vuls: Open-source vulnerability scanner

Vuls: Open-source vulnerability scanner

7
Comments
4 min read
7 Mobile App Security Risks and How to Mitigate Them

7 Mobile App Security Risks and How to Mitigate Them

14
Comments
8 min read
Protecting Against XSS Attacks in React

Protecting Against XSS Attacks in React

42
Comments
4 min read
Trust, But Verify (Downloads)

Trust, But Verify (Downloads)

8
Comments 1
2 min read
Windows Hot Patching Mechanism Explained

Windows Hot Patching Mechanism Explained

13
Comments
5 min read
How to use Snyk for fixing node module vulnerabilities

How to use Snyk for fixing node module vulnerabilities

14
Comments 3
8 min read
Spring Boot and Multiple Authentication Profiles (None, Password & Okta)

Spring Boot and Multiple Authentication Profiles (None, Password & Okta)

3
Comments 2
2 min read
Using Environment Variables in NodeJS, and why we want to use them.

Using Environment Variables in NodeJS, and why we want to use them.

8
Comments
2 min read
Top 10 Reverse Engineering Tools

Top 10 Reverse Engineering Tools

46
Comments
3 min read
Thoughts on Passwordless Authentication

Thoughts on Passwordless Authentication

5
Comments 1
4 min read
How to add Kerberos Authentication to Your Site With Minimum Efforts

How to add Kerberos Authentication to Your Site With Minimum Efforts

10
Comments
2 min read
Secure your Data API from Web Scrapers

Secure your Data API from Web Scrapers

157
Comments 10
5 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

99
Comments 1
9 min read
How to TPM - Part 2 : TPM Software Stack

How to TPM - Part 2 : TPM Software Stack

7
Comments 1
3 min read
Dotenv - Dealing with Environment variables.

Dotenv - Dealing with Environment variables.

13
Comments 1
3 min read
SSL/TLS Vulnerabilities

SSL/TLS Vulnerabilities

26
Comments
2 min read
Security news weekly round-up - 10th July 2020

Security news weekly round-up - 10th July 2020

5
Comments
5 min read
Social Engineering: The performance security

Social Engineering: The performance security

20
Comments
5 min read
What everyone must know about front end security?

What everyone must know about front end security?

8
Comments
5 min read
How safe is same-origin client-server communication?

How safe is same-origin client-server communication?

4
Comments 8
1 min read
If your open source dependencies are a mess, we’ve got you. Introducing catalogs.

If your open source dependencies are a mess, we’ve got you. Introducing catalogs.

23
Comments
6 min read
4 Key Benefits of Managed Security Service Provider (MSSP)

4 Key Benefits of Managed Security Service Provider (MSSP)

5
Comments
3 min read
What is thehiddenwiki.org??

What is thehiddenwiki.org??

4
Comments 3
1 min read
Dorking - O que podemos aprender sobre vazamento de dados por indexação involuntária em ferramentas de busca

Dorking - O que podemos aprender sobre vazamento de dados por indexação involuntária em ferramentas de busca

7
Comments 1
5 min read
AWS EC2 - EBS Volume Encryption

AWS EC2 - EBS Volume Encryption

9
Comments 5
4 min read
Zoom Mac Vulnerability: Automating Removal

Zoom Mac Vulnerability: Automating Removal

3
Comments
3 min read
How to spot fake job posts and offers

How to spot fake job posts and offers

3
Comments
2 min read
5 of the Top Cybersecurity Risks & Ways to Address Them in 2020

5 of the Top Cybersecurity Risks & Ways to Address Them in 2020

12
Comments
1 min read
How to host a website on the Dark web

How to host a website on the Dark web

64
Comments 5
5 min read
What You Need to Know About Cyber Security in the Cloud

What You Need to Know About Cyber Security in the Cloud

26
Comments 1
6 min read
Sandboxing in Linux with zero lines of code

Sandboxing in Linux with zero lines of code

10
Comments
20 min read
Add Google Login to your React Apps in 10 mins

Add Google Login to your React Apps in 10 mins

196
Comments 39
4 min read
The Auth Bottleneck Pattern

The Auth Bottleneck Pattern

5
Comments
5 min read
Understanding SHA256

Understanding SHA256

4
Comments
4 min read
CTF Hacking: What is Capture the Flag for a Beginners?

CTF Hacking: What is Capture the Flag for a Beginners?

7
Comments
3 min read
Passwords

Passwords

42
Comments 9
8 min read
Applying the Well-Architected Framework, Small Edition

Applying the Well-Architected Framework, Small Edition

246
Comments 16
13 min read
Attack-Driven Defense for Web Applications

Attack-Driven Defense for Web Applications

4
Comments
1 min read
How to use npm audit with Continuous Integration in 3 simple steps

How to use npm audit with Continuous Integration in 3 simple steps

2
Comments
1 min read
Validating Inbound Messages From the Vonage Messages API

Validating Inbound Messages From the Vonage Messages API

6
Comments 1
7 min read
loading...