DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
(Video) Authentication Service in Actix - Part 1: Configuration

(Video) Authentication Service in Actix - Part 1: Configuration

9
Comments
1 min read
AWS 🔒 How to restrict access by IP

AWS 🔒 How to restrict access by IP

11
Comments 1
2 min read
The Memory Layout Explained

The Memory Layout Explained

5
Comments
4 min read
Pre-Launch Android App Security Checklist

Pre-Launch Android App Security Checklist

29
Comments 3
6 min read
Security news weekly round-up - 3rd July 2020

Security news weekly round-up - 3rd July 2020

4
Comments
4 min read
Hybrid Identity

Hybrid Identity

2
Comments
2 min read
Handling JWT in Admin Apps the Right Way

Handling JWT in Admin Apps the Right Way

11
Comments
10 min read
How to Think About JavaScript Security

How to Think About JavaScript Security

22
Comments
3 min read
Drops #01: Corrigindo vulnerabilidades em dependências com Yarn! (ou quase)

Drops #01: Corrigindo vulnerabilidades em dependências com Yarn! (ou quase)

11
Comments
3 min read
Look mom, I'm a GitHub Action Hero

Look mom, I'm a GitHub Action Hero

86
Comments 4
4 min read
NETWORK SECURITY- TERMINOLOGY

NETWORK SECURITY- TERMINOLOGY

10
Comments 2
3 min read
Make yourself rich by hacking this juice shop 💵

Make yourself rich by hacking this juice shop 💵

48
Comments
3 min read
Why not to create db asset from code

Why not to create db asset from code

3
Comments 3
1 min read
Hardening your server security with Fail2Ban

Hardening your server security with Fail2Ban

15
Comments
6 min read
DevSecOps - Mass Assignment

DevSecOps - Mass Assignment

10
Comments
6 min read
Why anti-encryption laws are crazy

Why anti-encryption laws are crazy

68
Comments 8
4 min read
Kendimize özel VPN kurulumu 🇹🇷

Kendimize özel VPN kurulumu 🇹🇷

7
Comments
5 min read
Email Security and Privacy

Email Security and Privacy

8
Comments 7
2 min read
The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

6
Comments
7 min read
Infrastructure-as-code security 101

Infrastructure-as-code security 101

7
Comments
5 min read
Managed Identity - How it works behind the scenes

Managed Identity - How it works behind the scenes

18
Comments 3
5 min read
I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

466
Comments 112
3 min read
White Box and Black Box Testing: Outlining the Difference Between Them

White Box and Black Box Testing: Outlining the Difference Between Them

13
Comments
7 min read
How to Block IP Addresses in WordPress?

How to Block IP Addresses in WordPress?

7
Comments
9 min read
SSL/TLS Handshake Failed Errors — Its Types and Learning How to Fix Them

SSL/TLS Handshake Failed Errors — Its Types and Learning How to Fix Them

2
Comments
6 min read
How can you find the most Secure Web Hosting

How can you find the most Secure Web Hosting

3
Comments 1
2 min read
rails 6: Prevents logging sensitive info accidentally

rails 6: Prevents logging sensitive info accidentally

12
Comments
2 min read
Zooming in on Zoom

Zooming in on Zoom

32
Comments
3 min read
Detecting Attackers from Within

Detecting Attackers from Within

7
Comments
6 min read
How to enable T.L.S 1.2 in R-Serve

How to enable T.L.S 1.2 in R-Serve

8
Comments
2 min read
How To Prevent Data Tampering In Your Business

How To Prevent Data Tampering In Your Business

7
Comments
6 min read
Web Sockets Everywhere!

Web Sockets Everywhere!

15
Comments
3 min read
How to 'Not Advertise' Your API Key in React Apps

How to 'Not Advertise' Your API Key in React Apps

17
Comments 10
2 min read
My first post - thought of the day

My first post - thought of the day

3
Comments
3 min read
Why I wrote a Password Manager and what I've learned

Why I wrote a Password Manager and what I've learned

5
Comments 2
2 min read
Day-11: Read Info-sec Write-Ups!

Day-11: Read Info-sec Write-Ups!

6
Comments 1
1 min read
Accidentally a hacker

Accidentally a hacker

28
Comments 2
10 min read
7 Types of Malware Attacks and How to Prevent Them

7 Types of Malware Attacks and How to Prevent Them

30
Comments
8 min read
Day-10: Bash Scripting - #2

Day-10: Bash Scripting - #2

6
Comments
2 min read
Using a Reverse Proxy to Protect Third Party APIs

Using a Reverse Proxy to Protect Third Party APIs

12
Comments
7 min read
COVID-19 and Cyber Security

COVID-19 and Cyber Security

3
Comments
4 min read
Empower Your Employees to Work From Home

Empower Your Employees to Work From Home

2
Comments
1 min read
OverTheWire :- Bandit (Level 10–15) [CTF]

OverTheWire :- Bandit (Level 10–15) [CTF]

6
Comments 2
4 min read
Introducing Kubernetes Goat

Introducing Kubernetes Goat

17
Comments
3 min read
Day-9: Bash Scripting - #1

Day-9: Bash Scripting - #1

24
Comments
2 min read
Why Not to Use Root User?

Why Not to Use Root User?

25
Comments 2
1 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

12
Comments
4 min read
Bad Security habits to lose

Bad Security habits to lose

36
Comments 4
3 min read
GCP Cloud Functions with a Static IP

GCP Cloud Functions with a Static IP

58
Comments 28
4 min read
Dockerfile Security Checks using OPA Rego Policies with Conftest

Dockerfile Security Checks using OPA Rego Policies with Conftest

4
Comments
3 min read
Hacker Container for Kubernetes Security Assessments

Hacker Container for Kubernetes Security Assessments

4
Comments
3 min read
DevSecOps - DoS - Paginação de APIs (Parte 3)

DevSecOps - DoS - Paginação de APIs (Parte 3)

8
Comments
5 min read
Day-8: Started with Pentesterlab!

Day-8: Started with Pentesterlab!

4
Comments
1 min read
Azure Event Hubs "Role Based Access Control" in action

Azure Event Hubs "Role Based Access Control" in action

18
Comments
7 min read
C++ Coding problem, unanswered!

C++ Coding problem, unanswered!

2
Comments 2
1 min read
Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Day-7: Nmap -- Hacker's Favourite Scanning Tool!

11
Comments 2
2 min read
Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

12
Comments
8 min read
Kubernetes Authentication

Kubernetes Authentication

10
Comments
5 min read
How to Develop A Cybersecurity Plan For Your Small Business?

How to Develop A Cybersecurity Plan For Your Small Business?

10
Comments
3 min read
Hacking the antivirus: BitDefender remote code execution vulnerability

Hacking the antivirus: BitDefender remote code execution vulnerability

4
Comments 2
4 min read
loading...