DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Enigma of LIQU3D: Decoding Kenya’s Cybersecurity Prodigy (2025)

The Enigma of LIQU3D: Decoding Kenya’s Cybersecurity Prodigy (2025)

1
Comments 2
2 min read
Security news weekly round-up - 7th March 2025

Security news weekly round-up - 7th March 2025

1
Comments
2 min read
🔐 How to create an authentication system with JWT in a Node.js API

🔐 How to create an authentication system with JWT in a Node.js API

2
Comments
3 min read
Breaking into Cybersecurity: My Experience and Career Roadmap

Breaking into Cybersecurity: My Experience and Career Roadmap

Comments
4 min read
Secure Google Drive Picker: Token Best Practices

Secure Google Drive Picker: Token Best Practices

2
Comments 1
2 min read
Understanding eBPF: A Game-Changer for Linux Kernel Extensions

Understanding eBPF: A Game-Changer for Linux Kernel Extensions

Comments
2 min read
How RBAC and ABAC Enhance Security and Compliance

How RBAC and ABAC Enhance Security and Compliance

Comments
5 min read
LTL and CTL Applications for Smart Contracts Security

LTL and CTL Applications for Smart Contracts Security

Comments
3 min read
Hack the Planet as a Service

Hack the Planet as a Service

Comments
3 min read
AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

Comments
4 min read
Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Comments
17 min read
Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

4
Comments
7 min read
Hash Passwords in Backend: A Guide for Every Tech Stack

Hash Passwords in Backend: A Guide for Every Tech Stack

1
Comments
3 min read
DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

Comments
6 min read
Beware of the New Enemy Problem ⚠️

Beware of the New Enemy Problem ⚠️

1
Comments
4 min read
Building a Secure User Activation System in Django

Building a Secure User Activation System in Django

3
Comments 1
4 min read
S3cmd: CLI for Object Storage

S3cmd: CLI for Object Storage

6
Comments
3 min read
Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Computer Viruses in Practice: Self-Replication

Computer Viruses in Practice: Self-Replication

Comments
6 min read
System Security Concepts

System Security Concepts

1
Comments 2
4 min read
A Guide to Role-Based Access Control (RBAC) in Strapi

A Guide to Role-Based Access Control (RBAC) in Strapi

3
Comments
14 min read
Content Security Policy: Your Website's Unsung Hero

Content Security Policy: Your Website's Unsung Hero

7
Comments
2 min read
Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Comments
3 min read
API Webhook Security

API Webhook Security

Comments
2 min read
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

7
Comments
6 min read
loading...