DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Generating pentest reports with Reconmap

Generating pentest reports with Reconmap

6
Comments
3 min read
What is a JWT token

What is a JWT token

44
Comments 4
3 min read
To improve good security practices

To improve good security practices

7
Comments
1 min read
A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

11
Comments
2 min read
GitHub Thrilled : Code scanning is now available!

GitHub Thrilled : Code scanning is now available!

12
Comments
1 min read
Microsoft September 2020 Patch Tuesday

Microsoft September 2020 Patch Tuesday

3
Comments
2 min read
Making Sense of the SOAR Cybersecurity Product Space

Making Sense of the SOAR Cybersecurity Product Space

2
Comments
7 min read
Adding SSL to our Azure Node app

Adding SSL to our Azure Node app

11
Comments
4 min read
CLAD Model for Serverless Security

CLAD Model for Serverless Security

26
Comments
11 min read
Node Package Manager (NPM) Audit and what that means!

Node Package Manager (NPM) Audit and what that means!

3
Comments
3 min read
CrowdSec, an open-source, modernized & collaborative Fail2ban

CrowdSec, an open-source, modernized & collaborative Fail2ban

37
Comments 8
3 min read
How to hide secrets in an image using Python

How to hide secrets in an image using Python

10
Comments
3 min read
Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

23
Comments 1
6 min read
Cryptography for programmers 1: Basics

Cryptography for programmers 1: Basics

469
Comments 10
5 min read
🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

12
Comments
3 min read
Accessing Key Vault secrets from an Azure Kubernetes Cluster

Accessing Key Vault secrets from an Azure Kubernetes Cluster

7
Comments
2 min read
TLS and SNI snooping

TLS and SNI snooping

2
Comments
1 min read
Web Dev Wednesday: App Security

Web Dev Wednesday: App Security

6
Comments
1 min read
Como o PHP lida com a questão da segurança

Como o PHP lida com a questão da segurança

9
Comments
2 min read
Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

19
Comments
11 min read
Cryptography for programmers 2: Blocks and Randomness

Cryptography for programmers 2: Blocks and Randomness

111
Comments 16
11 min read
Fixing vulnerabilities in Maven projects

Fixing vulnerabilities in Maven projects

12
Comments
5 min read
What's the best VPN service?

What's the best VPN service?

14
Comments 21
1 min read
In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

In Which Sarah Learns Web Security: Part Three, The Most Common Attacks, Part One

8
Comments
11 min read
Establishing and securing a remote connection to Raspberry Pi

Establishing and securing a remote connection to Raspberry Pi

32
Comments 2
10 min read
Como eu encontrei uma falha na plataforma EAD da Estácio.

Como eu encontrei uma falha na plataforma EAD da Estácio.

18
Comments
3 min read
How do you store private keys?

How do you store private keys?

58
Comments 17
1 min read
Let's talk about Serverless Security – Create:Serverless

Let's talk about Serverless Security – Create:Serverless

20
Comments
3 min read
How important is privacy to you in choosing a cloud provider?

How important is privacy to you in choosing a cloud provider?

2
Comments 4
1 min read
Make your Ubuntu Server VPS more secure against unauthorized access

Make your Ubuntu Server VPS more secure against unauthorized access

23
Comments
10 min read
How-to #1. Data encryption.

How-to #1. Data encryption.

5
Comments
4 min read
Add SSL Cert to Nginx

Add SSL Cert to Nginx

9
Comments
3 min read
VPN Service? Not as secure as they sound

VPN Service? Not as secure as they sound

7
Comments 2
5 min read
Security Headers

Security Headers

8
Comments
1 min read
Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

7
Comments
6 min read
Stricter Access Control to Google Cloud Registry

Stricter Access Control to Google Cloud Registry

4
Comments
3 min read
Essential Docker Container Security Features

Essential Docker Container Security Features

9
Comments 2
4 min read
DangerouslySetInnerHTML in React

DangerouslySetInnerHTML in React

4
Comments
3 min read
CORS & Preflight Request!

CORS & Preflight Request!

25
Comments 3
3 min read
Intro to Security as Code

Intro to Security as Code

6
Comments
8 min read
Security news weekly round-up - 25th September 2020

Security news weekly round-up - 25th September 2020

3
Comments
3 min read
A (secret) way to bypass Chrome's security/privacy error

A (secret) way to bypass Chrome's security/privacy error

22
Comments 1
1 min read
Vaccines for Common SQL Injection Bugs

Vaccines for Common SQL Injection Bugs

4
Comments
2 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

5
Comments 2
1 min read
How to monitorize program execution on Windows using Wazuh and sysmon.

How to monitorize program execution on Windows using Wazuh and sysmon.

5
Comments
3 min read
Securing our Serverless Apps on Azure

Securing our Serverless Apps on Azure

3
Comments
1 min read
3 sets of Cybersecurity challenges & answers (CTF) to learn from

3 sets of Cybersecurity challenges & answers (CTF) to learn from

28
Comments
2 min read
Why Do Certificate Revocation Checking Mechanisms Never Work?

Why Do Certificate Revocation Checking Mechanisms Never Work?

2
Comments
18 min read
On .NET Episode: Securing Services with MSAL

On .NET Episode: Securing Services with MSAL

11
Comments
1 min read
A Field Guide to CoAP, Part 1

A Field Guide to CoAP, Part 1

5
Comments
8 min read
How to Integrate Security Into a DevOps Cycle

How to Integrate Security Into a DevOps Cycle

13
Comments
5 min read
Are you worried about Security at the Application Layer?

Are you worried about Security at the Application Layer?

9
Comments
4 min read
Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
How create a discipline routine for learn development!

How create a discipline routine for learn development!

3
Comments 1
1 min read
A Practical Guide to AWS IAM

A Practical Guide to AWS IAM

3
Comments 2
1 min read
Secure SDLC and Best Practices for Outsourcing

Secure SDLC and Best Practices for Outsourcing

7
Comments
6 min read
CodeQL Analysis on GitHub

CodeQL Analysis on GitHub

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
Generating a Self Signed Certificate using Powershell

Generating a Self Signed Certificate using Powershell

9
Comments
1 min read
SPFx issues with the new Referrer-Policy in Chrome >= 85

SPFx issues with the new Referrer-Policy in Chrome >= 85

3
Comments
2 min read
loading...