DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
¿WhoUr? A Tool for information gathering, IPReverse, AdminFinder, DNS, WHOIS, SQLi Scanner with google.

¿WhoUr? A Tool for information gathering, IPReverse, AdminFinder, DNS, WHOIS, SQLi Scanner with google.

5
Comments
1 min read
¿js.apies.org who is? ¡Wordpress WebShell!

¿js.apies.org who is? ¡Wordpress WebShell!

4
Comments
1 min read
Getting Started with LightHouse CI - Part 1

Getting Started with LightHouse CI - Part 1

5
Comments
4 min read
Lab HashStack - Part 1

Lab HashStack - Part 1

12
Comments
2 min read
7 Best Practices for JSON Web Tokens

7 Best Practices for JSON Web Tokens

77
Comments 22
7 min read
Come to our security workshop this Saturday in NYC

Come to our security workshop this Saturday in NYC

6
Comments
1 min read
36th Chaos Communication Congress (36C3) reflections

36th Chaos Communication Congress (36C3) reflections

7
Comments
3 min read
The CCPA is here! Now what?

The CCPA is here! Now what?

6
Comments
6 min read
Should you encrypt or compress first?

Should you encrypt or compress first?

33
Comments 9
6 min read
💻👉My top 6 talks from the first day of the #36c3 congress aka chaos communication congress 2019 plus one bonus

💻👉My top 6 talks from the first day of the #36c3 congress aka chaos communication congress 2019 plus one bonus

52
Comments 2
4 min read
Realme 5 and 5s receive updates with December 2019 security patches

Realme 5 and 5s receive updates with December 2019 security patches

4
Comments
2 min read
MongoDB ransoms in 2017

MongoDB ransoms in 2017

2
Comments
2 min read
What personal privacy/security measures do you take?

What personal privacy/security measures do you take?

5
Comments 36
1 min read
💻👉My top 6 talks from the fourth day of the #36c3 congress aka chaos communication congress 2019

💻👉My top 6 talks from the fourth day of the #36c3 congress aka chaos communication congress 2019

14
Comments 2
2 min read
💻👉My top 6 talks from the third day of the #36c3 congress aka chaos communication congress 2019

💻👉My top 6 talks from the third day of the #36c3 congress aka chaos communication congress 2019

35
Comments
3 min read
💻👉My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019

💻👉My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019

14
Comments
3 min read
Testing as another user…without their password

Testing as another user…without their password

7
Comments
5 min read
What the heck is the dbcreator role?

What the heck is the dbcreator role?

6
Comments
3 min read
How to implement Security to connect monolithic Spring 3 application with spring boot microservice?

How to implement Security to connect monolithic Spring 3 application with spring boot microservice?

3
Comments 1
1 min read
Debugging in prod: Maximizing user attack surface

Debugging in prod: Maximizing user attack surface

7
Comments
2 min read
How To Generate Git SSH Keys

How To Generate Git SSH Keys

5
Comments
4 min read
How you can check you have been hacked or not for free?

How you can check you have been hacked or not for free?

5
Comments
2 min read
Certificate Pinning in Android

Certificate Pinning in Android

8
Comments 3
2 min read
Practice with AWS Access analyzer

Practice with AWS Access analyzer

6
Comments
2 min read
Device Interconnections Monitor

Device Interconnections Monitor

4
Comments
1 min read
This Dot Labs Podcast: Security

This Dot Labs Podcast: Security

5
Comments
4 min read
Microservices: OAuth2 vs Simple JWT Authentication

Microservices: OAuth2 vs Simple JWT Authentication

6
Comments 2
1 min read
How to Detect the .bt WordPress Hack

How to Detect the .bt WordPress Hack

6
Comments
4 min read
#30DaysOfThreads - The Cyber Attack Lifecycle

#30DaysOfThreads - The Cyber Attack Lifecycle

6
Comments 2
2 min read
Create a Secure Azure Sphere App using the Grove Shield Sensor Kit

Create a Secure Azure Sphere App using the Grove Shield Sensor Kit

8
Comments
7 min read
SQL is Insecure

SQL is Insecure

6
Comments 31
2 min read
MQTT Security

MQTT Security

7
Comments
2 min read
Tips for container, DNS & database security

Tips for container, DNS & database security

37
Comments
2 min read
Scale Securely with Transit Gateway

Scale Securely with Transit Gateway

2
Comments
1 min read
10 Signs showing your WordPress Site is Hacked

10 Signs showing your WordPress Site is Hacked

4
Comments
7 min read
About error handling in Go; logging best practices; & ATO attacks

About error handling in Go; logging best practices; & ATO attacks

39
Comments
2 min read
The care and feeding of an IoT device

The care and feeding of an IoT device

20
Comments 1
4 min read
Security Risks of 5G Networks

Security Risks of 5G Networks

5
Comments
5 min read
How does delegated credential works?

How does delegated credential works?

6
Comments
1 min read
Tips on avoiding intellectual property theft in outsourcing

Tips on avoiding intellectual property theft in outsourcing

4
Comments
4 min read
AWS protect SSRF vulnerabilities with new EC2 Instance Metadata feature

AWS protect SSRF vulnerabilities with new EC2 Instance Metadata feature

12
Comments
1 min read
Integrate static security checking for python!

Integrate static security checking for python!

7
Comments
2 min read
Reverse Shell Generation.

Reverse Shell Generation.

3
Comments
1 min read
Top Tricks Hackers do to infect your system on Social Internet

Top Tricks Hackers do to infect your system on Social Internet

6
Comments
1 min read
Create a Content Security Policy (CSP) in Hugo

Create a Content Security Policy (CSP) in Hugo

12
Comments
5 min read
Preventing Homoglyph attacks with OCR.

Preventing Homoglyph attacks with OCR.

17
Comments
4 min read
Top 5 Best Practices for Angular App Security

Top 5 Best Practices for Angular App Security

13
Comments
5 min read
Serverless Security with Unikernels

Serverless Security with Unikernels

9
Comments
12 min read
Third party

Third party

6
Comments
4 min read
Distributed Rant Series Part 2

Distributed Rant Series Part 2

6
Comments
6 min read
Distributed Rant Series Part 1

Distributed Rant Series Part 1

4
Comments 1
2 min read
How to minimize security concerns in your applications

How to minimize security concerns in your applications

35
Comments 5
2 min read
Modern Trends Of Cyber Attacks

Modern Trends Of Cyber Attacks

9
Comments
1 min read
How to deal with outsourcing fraud

How to deal with outsourcing fraud

6
Comments
4 min read
Firewalls on Linux

Firewalls on Linux

9
Comments
2 min read
Silent push for the web

Silent push for the web

5
Comments
3 min read
Lead SDET Opportunity - Banyan Security (San Francisco)

Lead SDET Opportunity - Banyan Security (San Francisco)

3
Comments
1 min read
The API Gateway security risk you need to pay attention to

The API Gateway security risk you need to pay attention to

8
Comments 2
4 min read
Lock Your Door and Close Your Windows

Lock Your Door and Close Your Windows

8
Comments
4 min read
Return Oriented Programming on ARM (32-bit)

Return Oriented Programming on ARM (32-bit)

31
Comments
5 min read
loading...