DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Email Security and Privacy

Email Security and Privacy

8
Comments 7
2 min read
The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

The Impact of Cross-Site Scripting Vulnerabilities and their Prevention

6
Comments
7 min read
Infrastructure-as-code security 101

Infrastructure-as-code security 101

7
Comments
5 min read
Managed Identity - How it works behind the scenes

Managed Identity - How it works behind the scenes

18
Comments 3
5 min read
I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

I was emailed after abandoning a registration form. I did not click Submit. This is not ok.

466
Comments 112
3 min read
White Box and Black Box Testing: Outlining the Difference Between Them

White Box and Black Box Testing: Outlining the Difference Between Them

13
Comments
7 min read
How to Block IP Addresses in WordPress?

How to Block IP Addresses in WordPress?

7
Comments
9 min read
SSL/TLS Handshake Failed Errors — Its Types and Learning How to Fix Them

SSL/TLS Handshake Failed Errors — Its Types and Learning How to Fix Them

2
Comments
6 min read
How can you find the most Secure Web Hosting

How can you find the most Secure Web Hosting

3
Comments 1
2 min read
rails 6: Prevents logging sensitive info accidentally

rails 6: Prevents logging sensitive info accidentally

12
Comments
2 min read
Zooming in on Zoom

Zooming in on Zoom

32
Comments
3 min read
Detecting Attackers from Within

Detecting Attackers from Within

7
Comments
6 min read
How to enable T.L.S 1.2 in R-Serve

How to enable T.L.S 1.2 in R-Serve

8
Comments
2 min read
How To Prevent Data Tampering In Your Business

How To Prevent Data Tampering In Your Business

7
Comments
6 min read
Web Sockets Everywhere!

Web Sockets Everywhere!

15
Comments
3 min read
How to 'Not Advertise' Your API Key in React Apps

How to 'Not Advertise' Your API Key in React Apps

17
Comments 10
2 min read
My first post - thought of the day

My first post - thought of the day

3
Comments
3 min read
Why I wrote a Password Manager and what I've learned

Why I wrote a Password Manager and what I've learned

5
Comments 2
2 min read
Day-11: Read Info-sec Write-Ups!

Day-11: Read Info-sec Write-Ups!

6
Comments 1
1 min read
Accidentally a hacker

Accidentally a hacker

28
Comments 2
10 min read
7 Types of Malware Attacks and How to Prevent Them

7 Types of Malware Attacks and How to Prevent Them

30
Comments
8 min read
Day-10: Bash Scripting - #2

Day-10: Bash Scripting - #2

6
Comments
2 min read
Using a Reverse Proxy to Protect Third Party APIs

Using a Reverse Proxy to Protect Third Party APIs

12
Comments
7 min read
COVID-19 and Cyber Security

COVID-19 and Cyber Security

3
Comments
4 min read
Empower Your Employees to Work From Home

Empower Your Employees to Work From Home

2
Comments
1 min read
OverTheWire :- Bandit (Level 10–15) [CTF]

OverTheWire :- Bandit (Level 10–15) [CTF]

6
Comments 2
4 min read
Introducing Kubernetes Goat

Introducing Kubernetes Goat

17
Comments
3 min read
Day-9: Bash Scripting - #1

Day-9: Bash Scripting - #1

24
Comments
2 min read
Why Not to Use Root User?

Why Not to Use Root User?

25
Comments 2
1 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

12
Comments
4 min read
Bad Security habits to lose

Bad Security habits to lose

36
Comments 4
3 min read
GCP Cloud Functions with a Static IP

GCP Cloud Functions with a Static IP

58
Comments 28
4 min read
Hacker Container for Kubernetes Security Assessments

Hacker Container for Kubernetes Security Assessments

4
Comments
3 min read
Dockerfile Security Checks using OPA Rego Policies with Conftest

Dockerfile Security Checks using OPA Rego Policies with Conftest

4
Comments
3 min read
DevSecOps - DoS - Paginação de APIs (Parte 3)

DevSecOps - DoS - Paginação de APIs (Parte 3)

8
Comments
5 min read
Day-8: Started with Pentesterlab!

Day-8: Started with Pentesterlab!

4
Comments
1 min read
Azure Event Hubs "Role Based Access Control" in action

Azure Event Hubs "Role Based Access Control" in action

18
Comments
7 min read
C++ Coding problem, unanswered!

C++ Coding problem, unanswered!

2
Comments 2
1 min read
Day-7: Nmap -- Hacker's Favourite Scanning Tool!

Day-7: Nmap -- Hacker's Favourite Scanning Tool!

11
Comments 2
2 min read
Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

Someone is watching you over the Internet. Protect and Fight Back - Man in the Middle

12
Comments
8 min read
Kubernetes Authentication

Kubernetes Authentication

10
Comments
5 min read
How to Develop A Cybersecurity Plan For Your Small Business?

How to Develop A Cybersecurity Plan For Your Small Business?

10
Comments
3 min read
What is Third-Party Risk Assessment and How Can You Do It?

What is Third-Party Risk Assessment and How Can You Do It?

6
Comments 2
5 min read
Hacking the antivirus: BitDefender remote code execution vulnerability

Hacking the antivirus: BitDefender remote code execution vulnerability

4
Comments 2
4 min read
Automated Attacker Synthesis for Distributed Protocols

Automated Attacker Synthesis for Distributed Protocols

5
Comments
5 min read
AzureFunBytes - AZ-900 Stream, Network Security Groups, SSH Keys, Linux VMs, and your questions.

AzureFunBytes - AZ-900 Stream, Network Security Groups, SSH Keys, Linux VMs, and your questions.

11
Comments 1
1 min read
Trapping Hackers with Containerized Deception

Trapping Hackers with Containerized Deception

23
Comments
15 min read
Day-6: JSON Web Tokens (JWT).

Day-6: JSON Web Tokens (JWT).

7
Comments 1
2 min read
Express-session vs SuperTokens for handling user sessions

Express-session vs SuperTokens for handling user sessions

8
Comments
11 min read
Make use of your Github Actions minutes for security checking Rails PRs

Make use of your Github Actions minutes for security checking Rails PRs

10
Comments 1
2 min read
Deciphering Single-byte XOR Ciphertext

Deciphering Single-byte XOR Ciphertext

8
Comments 1
8 min read
Day-5: A day off but...

Day-5: A day off but...

3
Comments
1 min read
30D2R - March: Bug Bounty Basics

30D2R - March: Bug Bounty Basics

5
Comments
5 min read
Manage your secrets in Git with SOPS for Kubectl & Kustomize 🔧

Manage your secrets in Git with SOPS for Kubectl & Kustomize 🔧

17
Comments 1
6 min read
Day-4: WebSocket! Wait, what???

Day-4: WebSocket! Wait, what???

8
Comments
2 min read
Client Certificate vs Server Certificate

Client Certificate vs Server Certificate

47
Comments 1
3 min read
American Communications Companies Appear to Be Under DDoS Attack

American Communications Companies Appear to Be Under DDoS Attack

57
Comments 14
1 min read
Custom Micronaut Security Rules

Custom Micronaut Security Rules

9
Comments
4 min read
6 Password Security Risks and How to Avoid Them

6 Password Security Risks and How to Avoid Them

106
Comments 4
9 min read
Day-3: Bypassing the SOP!💣

Day-3: Bypassing the SOP!💣

8
Comments
2 min read
loading...