DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Writing secure code for web applications🔓

Writing secure code for web applications🔓

Comments
4 min read
#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

Comments
3 min read
🔐 Enhancing Security of React Apps

🔐 Enhancing Security of React Apps

Comments
1 min read
Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Comments
4 min read
Exploit Development: Buffer Overflows

Exploit Development: Buffer Overflows

10
Comments
3 min read
Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

2
Comments 2
4 min read
Subnetting

Subnetting

15
Comments 3
3 min read
Web Application Security 101

Web Application Security 101

2
Comments
1 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Comments
8 min read
Can you become an Ethical Hacker without a degree?

Can you become an Ethical Hacker without a degree?

2
Comments
3 min read
Secure Connection between Lambda and RDS: Choosing and Implementing SSL/TLS Certificates

Secure Connection between Lambda and RDS: Choosing and Implementing SSL/TLS Certificates

7
Comments
2 min read
Como identificar vulnerabilidades no cĂłdigo fonte?

Como identificar vulnerabilidades no cĂłdigo fonte?

23
Comments 3
8 min read
Beyond the login page

Beyond the login page

22
Comments 4
4 min read
Express.js Security Best Practices

Express.js Security Best Practices

2
Comments
3 min read
Navigating the JavaScript Frontier with is.primitive and is.not_primitive from 'thiis'

Navigating the JavaScript Frontier with is.primitive and is.not_primitive from 'thiis'

5
Comments 1
3 min read
Unraveling My Uncle's Online Gold Scam

Unraveling My Uncle's Online Gold Scam

8
Comments 2
8 min read
Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 5. Connecting dots

Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 5. Connecting dots

2
Comments 1
4 min read
Essential AWS IAM Enumeration Commands

Essential AWS IAM Enumeration Commands

2
Comments
6 min read
API World 2023: Bringing together API, AI, and Secrets security

API World 2023: Bringing together API, AI, and Secrets security

1
Comments
9 min read
Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

Comments
4 min read
🎆Party Time: Your Security Supporters with PartyRock

🎆Party Time: Your Security Supporters with PartyRock

10
Comments
3 min read
Explorando a api do kubernetes

Explorando a api do kubernetes

Comments
9 min read
SSL/TLS Handshake Explained: A Simple Guide for Secure Connections!

SSL/TLS Handshake Explained: A Simple Guide for Secure Connections!

6
Comments 1
9 min read
How to Search for Open Amazon S3 Buckets and Their Contents Using OpenBuckets

How to Search for Open Amazon S3 Buckets and Their Contents Using OpenBuckets

1
Comments
3 min read
Cross-Origin Resource Sharing (CORS)

Cross-Origin Resource Sharing (CORS)

28
Comments 7
7 min read
Navigating the Browser Landscape with is.ie and is.not_ie from 'thiis': A Journey into Internet Explorer Detection

Navigating the Browser Landscape with is.ie and is.not_ie from 'thiis': A Journey into Internet Explorer Detection

8
Comments 1
3 min read
AWS security audit guide

AWS security audit guide

2
Comments 1
3 min read
Use IAM Roles Anywhere to reduce the use of IAM keys

Use IAM Roles Anywhere to reduce the use of IAM keys

7
Comments
31 min read
The Secure Path Forward for eBPF runtime: Challenges and Innovations

The Secure Path Forward for eBPF runtime: Challenges and Innovations

4
Comments
16 min read
Hashing User Passwords Using bcrypt in Python

Hashing User Passwords Using bcrypt in Python

8
Comments
5 min read
Docker Scout for Your Kubernetes Cluster

Docker Scout for Your Kubernetes Cluster

1
Comments
6 min read
Authorization

Authorization

1
Comments 1
3 min read
Security in modern Web Applications -> Owasp to the rescue!

Security in modern Web Applications -> Owasp to the rescue!

10
Comments 4
4 min read
OPA vs. Google Zanzibar: A Brief Comparison

OPA vs. Google Zanzibar: A Brief Comparison

12
Comments
5 min read
Use SOPS in Ansible to read your secrets

Use SOPS in Ansible to read your secrets

Comments
12 min read
Unleashing the Power of `is.edge` and `is.not_edge` with 'thiis': Your Gateway to JavaScript Magic

Unleashing the Power of `is.edge` and `is.not_edge` with 'thiis': Your Gateway to JavaScript Magic

4
Comments 1
4 min read
Cyber Security Analyst vs. Cyber Security Consultant

Cyber Security Analyst vs. Cyber Security Consultant

2
Comments
4 min read
Navigating the Browser World with is.chrome and is.not_chrome: Your Friendly Guide to Browser Checks

Navigating the Browser World with is.chrome and is.not_chrome: Your Friendly Guide to Browser Checks

3
Comments 1
3 min read
Securing Connections: A Comprehensive Guide to IPSec and VPN Mastery

Securing Connections: A Comprehensive Guide to IPSec and VPN Mastery

1
Comments
9 min read
Building Secure Foundations: A Practical Guide to Minimizing Linux Services' Attack Surface

Building Secure Foundations: A Practical Guide to Minimizing Linux Services' Attack Surface

10
Comments
11 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
Secure your Web Applications with Facial Authentication

Secure your Web Applications with Facial Authentication

10
Comments 1
6 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

81
Comments 16
8 min read
The Role of AI in Optimising API Performance

The Role of AI in Optimising API Performance

Comments
9 min read
Unleashing the Magic of `is.truthy` and `is.not_truthy` with 'thiis': A Playground of JavaScript Booleans

Unleashing the Magic of `is.truthy` and `is.not_truthy` with 'thiis': A Playground of JavaScript Booleans

4
Comments 1
3 min read
How To Secure Your AWS API Gateway Using A Lambda Authorizer

How To Secure Your AWS API Gateway Using A Lambda Authorizer

5
Comments
8 min read
Rails Authentication for Compliance

Rails Authentication for Compliance

1
Comments 3
4 min read
On the joy of learning and bypassing brute-force protection

On the joy of learning and bypassing brute-force protection

4
Comments
4 min read
Dicas de codificação segura em C#

Dicas de codificação segura em C#

23
Comments 3
9 min read
C++ and the future

C++ and the future

Comments
1 min read
Yes, GitHub's Copilot can Leak (Real) Secrets

Yes, GitHub's Copilot can Leak (Real) Secrets

Comments
6 min read
Mastering Booleans with is.true and is.not_true in JavaScript: Your Guide to True Values

Mastering Booleans with is.true and is.not_true in JavaScript: Your Guide to True Values

4
Comments 1
3 min read
Ensuring effective cloud security: Best practices and real-world insights

Ensuring effective cloud security: Best practices and real-world insights

3
Comments
8 min read
SSH as VPN Alternative

SSH as VPN Alternative

48
Comments 10
2 min read
Kubescape 3.0 is available to enhance your K8s security experience

Kubescape 3.0 is available to enhance your K8s security experience

1
Comments
1 min read
Securing Nodemailer with Proper Authentication

Securing Nodemailer with Proper Authentication

10
Comments
11 min read
The Lazy Developer: Testing in production is real, but…

The Lazy Developer: Testing in production is real, but…

2
Comments
3 min read
Making JavaScript Fun with is.false and is.not_false from 'thiis'

Making JavaScript Fun with is.false and is.not_false from 'thiis'

3
Comments 1
4 min read
How to Secure Your Container Registries With GitGuardian's Honeytoken

How to Secure Your Container Registries With GitGuardian's Honeytoken

Comments
8 min read
Mastering `is.boolean` for Type Checking in JavaScript with 'thiis': Fun Examples and Useful Tips

Mastering `is.boolean` for Type Checking in JavaScript with 'thiis': Fun Examples and Useful Tips

6
Comments 1
4 min read
loading...