DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

3
Comments
6 min read
How to Build your own Amazon Ring Security System in an Afternoon

How to Build your own Amazon Ring Security System in an Afternoon

63
Comments
16 min read
Using Microsoft Defender ATP Streaming API with Misp

Using Microsoft Defender ATP Streaming API with Misp

5
Comments
6 min read
5 steps to make your iOS app more secure

5 steps to make your iOS app more secure

7
Comments
3 min read
Security Basics Every Programmer should know from the Start

Security Basics Every Programmer should know from the Start

6
Comments
3 min read
What is a password manager?

What is a password manager?

3
Comments
1 min read
Block SSH brute-force attacks

Block SSH brute-force attacks

13
Comments 7
2 min read
A maze called VPN logging policies

A maze called VPN logging policies

6
Comments 3
2 min read
Importance of GDPR Compliance in a Development Project?

Importance of GDPR Compliance in a Development Project?

3
Comments
4 min read
Protecting your digital self at Hacker Summer Camp

Protecting your digital self at Hacker Summer Camp

6
Comments
1 min read
My password policy

My password policy

4
Comments
2 min read
Blockchain Solution - Alwin Technologies

Blockchain Solution - Alwin Technologies

3
Comments 1
1 min read
TELLIT

TELLIT

9
Comments
1 min read
You can’t function in 2019 without a password manager

You can’t function in 2019 without a password manager

6
Comments
3 min read
You stole my source code on Neopets

You stole my source code on Neopets

5
Comments
7 min read
Why Should You Use Cloudflare Like I Do

Why Should You Use Cloudflare Like I Do

4
Comments
1 min read
What if your laptop or hard drive with sensitive data is stolen or you lost it?

What if your laptop or hard drive with sensitive data is stolen or you lost it?

11
Comments
6 min read
The Dangers of Shadow IT

The Dangers of Shadow IT

4
Comments
3 min read
How to use python objects like java-script dictionaries.

How to use python objects like java-script dictionaries.

6
Comments
1 min read
Introducing Osgood

Introducing Osgood

43
Comments 5
4 min read
How to Protect a WordPress site from being Hacked

How to Protect a WordPress site from being Hacked

5
Comments
17 min read
Pipdig Under Investigation (and Your Options If You Want Out)

Pipdig Under Investigation (and Your Options If You Want Out)

5
Comments
8 min read
WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

5
Comments
13 min read
0-day Vulnerability for Social Warfare WordPress plugin

0-day Vulnerability for Social Warfare WordPress plugin

4
Comments
2 min read
WooCommerce Checkout Manager 4.2.6 Vulnerability

WooCommerce Checkout Manager 4.2.6 Vulnerability

3
Comments
1 min read
Secrets Management in Elixir Using AWS

Secrets Management in Elixir Using AWS

19
Comments
3 min read
SAST Tooling – Part 2: The selection criteria

SAST Tooling – Part 2: The selection criteria

5
Comments
3 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

14
Comments
6 min read
Securing APIs and Microservices with OAuth and OpenID Connect

Securing APIs and Microservices with OAuth and OpenID Connect

9
Comments
1 min read
Chatbot Security Framework: Everything you need to know about Chatbot security

Chatbot Security Framework: Everything you need to know about Chatbot security

4
Comments
7 min read
Technology landscape for Identification Management System

Technology landscape for Identification Management System

9
Comments
4 min read
Using EasyAuth (AppService Authentication) with ASP.NET Core

Using EasyAuth (AppService Authentication) with ASP.NET Core

12
Comments
3 min read
The latest npm breach…or is it?

The latest npm breach…or is it?

4
Comments
8 min read
How to protect your Node.js applications from malicious dependencies

How to protect your Node.js applications from malicious dependencies

6
Comments
5 min read
AppArmor with Python

AppArmor with Python

3
Comments
2 min read
Eight moderator factors of security and performance verification

Eight moderator factors of security and performance verification

8
Comments 1
1 min read
SAST Tooling – Part 3: The Winner

SAST Tooling – Part 3: The Winner

5
Comments
4 min read
SQL Injection??

SQL Injection??

6
Comments 1
1 min read
Flutter at IO Extended Kuala Lumpur 2019 — Follow-up

Flutter at IO Extended Kuala Lumpur 2019 — Follow-up

3
Comments
13 min read
Happy DAY - My Github Project listed in BlackArch OS

Happy DAY - My Github Project listed in BlackArch OS

11
Comments 2
1 min read
Security Using Spring and JWT

Security Using Spring and JWT

6
Comments
16 min read
Five Hard Earned Tips For Increasing Your Wordpress Security

Five Hard Earned Tips For Increasing Your Wordpress Security

8
Comments
6 min read
Creating a covert channel over the Telegram

Creating a covert channel over the Telegram

11
Comments
7 min read
PWGen - Create strong passwords easy to remember but hard to break

PWGen - Create strong passwords easy to remember but hard to break

6
Comments
2 min read
How to Protect React Native Apps with Jscrambler

How to Protect React Native Apps with Jscrambler

6
Comments
5 min read
How to send file securely on the blockchain [The easy way]

How to send file securely on the blockchain [The easy way]

15
Comments
2 min read
Hackitect series vol.1 - Hackitect journey as the mission

Hackitect series vol.1 - Hackitect journey as the mission

10
Comments
5 min read
How to do Security Updates only with Yum in CentOS

How to do Security Updates only with Yum in CentOS

7
Comments 1
1 min read
Global AppSec 2019 - Tel Aviv

Global AppSec 2019 - Tel Aviv

5
Comments
6 min read
5 cosas que aprendí en KubeCon Barcelona

5 cosas que aprendí en KubeCon Barcelona

10
Comments 2
4 min read
Why should Drupal be your first choice of open source CMS?

Why should Drupal be your first choice of open source CMS?

4
Comments
1 min read
Are Passwords A Thing Of The Past?

Are Passwords A Thing Of The Past?

4
Comments
2 min read
Establishing Trust: Why TLS should be important to you

Establishing Trust: Why TLS should be important to you

5
Comments
5 min read
3 Metrics Relevant to Every Service, Always

3 Metrics Relevant to Every Service, Always

5
Comments
5 min read
Securing a Webapp - Step 0: An Introduction

Securing a Webapp - Step 0: An Introduction

50
Comments 4
2 min read
Testing python security

Testing python security

8
Comments
1 min read
Security leader interview: Adam Surak on approaching security at Algolia

Security leader interview: Adam Surak on approaching security at Algolia

3
Comments
7 min read
Improving security in ASP.NET MVC using custom headers

Improving security in ASP.NET MVC using custom headers

28
Comments 6
4 min read
The secret sauce of software licenses: it may be bitter.

The secret sauce of software licenses: it may be bitter.

4
Comments
4 min read
MPC Part 1: Oblivious Transfer

MPC Part 1: Oblivious Transfer

8
Comments 3
8 min read
loading...