DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protecting your frontend with a Content Security Policy

Protecting your frontend with a Content Security Policy

10
Comments
8 min read
🧟 Emojis can be wicked

🧟 Emojis can be wicked

4
Comments 2
4 min read
Protect Your Contact Information From Crawlers

Protect Your Contact Information From Crawlers

61
Comments 17
3 min read
Before You CTF (Capture the Flag), Get Your Environment Ready

Before You CTF (Capture the Flag), Get Your Environment Ready

21
Comments 2
6 min read
Somebody Else's Python

Somebody Else's Python

10
Comments
2 min read
The safest way to download a private repository

The safest way to download a private repository

6
Comments
1 min read
0x00SEC CTF - Exercise #2

0x00SEC CTF - Exercise #2

9
Comments
3 min read
How to implement DevSecOps across the entire organisation

How to implement DevSecOps across the entire organisation

12
Comments
1 min read
Web Application Firewall - Friend of your DevOps pipeline?

Web Application Firewall - Friend of your DevOps pipeline?

8
Comments
1 min read
Linux: gnome-keyring setup as Freedesktop SecretService

Linux: gnome-keyring setup as Freedesktop SecretService

9
Comments
5 min read
OWASP Top 10 Security Vulnerabilities

OWASP Top 10 Security Vulnerabilities

88
Comments 1
5 min read
Stack Overflow is leaking user emails

Stack Overflow is leaking user emails

115
Comments 11
2 min read
Creating A Cypress Test Environment To Skip Authentication

Creating A Cypress Test Environment To Skip Authentication

16
Comments 1
2 min read
User Authentication + JWT Authorization With Flutter and Node

User Authentication + JWT Authorization With Flutter and Node

249
Comments 29
16 min read
Hack Wifi (WPA/WPA2) with Aircrack-ng

Hack Wifi (WPA/WPA2) with Aircrack-ng

109
Comments 27
2 min read
How to Create an Effective Incident Response Plan

How to Create an Effective Incident Response Plan

7
Comments
6 min read
The 10 most critical API security risks - Part 6: Mass Assignment

The 10 most critical API security risks - Part 6: Mass Assignment

7
Comments
2 min read
Best practices: Avoid race conditions 🚘💥🚗😰

Best practices: Avoid race conditions 🚘💥🚗😰

64
Comments 2
2 min read
Securing React Native Applications

Securing React Native Applications

18
Comments
11 min read
The Security of GitHub Actions

The Security of GitHub Actions

11
Comments
7 min read
I wonder about security of GraphQL, esp for C-UD

I wonder about security of GraphQL, esp for C-UD

9
Comments 1
1 min read
Fix Chrome80 SameSite Issue

Fix Chrome80 SameSite Issue

7
Comments
1 min read
react-create-app devel server + subdomain + https

react-create-app devel server + subdomain + https

6
Comments
2 min read
Analyzing the Attacks on my Website

Analyzing the Attacks on my Website

448
Comments 22
5 min read
Certificate Validity Dates

Certificate Validity Dates

7
Comments 1
3 min read
Automatically detect secrets in your internal repos

Automatically detect secrets in your internal repos

39
Comments 1
4 min read
GraphQL security in Node.js project

GraphQL security in Node.js project

11
Comments
6 min read
Angular vs React: security bakeoff 2019

Angular vs React: security bakeoff 2019

11
Comments
4 min read
How to setup Vault with Kubernetes

How to setup Vault with Kubernetes

51
Comments
9 min read
Testing Non-Functional Requirements

Testing Non-Functional Requirements

15
Comments 1
4 min read
Role-based auth in Angular 9 🔑

Role-based auth in Angular 9 🔑

49
Comments
1 min read
Security of Wireless Devices

Security of Wireless Devices

4
Comments 1
6 min read
5 things to consider before developing a web application

5 things to consider before developing a web application

7
Comments
4 min read
Secure Instant Messaging Platform - The Importance of Security Algorithm in Chat Apps

Secure Instant Messaging Platform - The Importance of Security Algorithm in Chat Apps

7
Comments 1
4 min read
Enforce security best practices in your AWS environment with AWS Config

Enforce security best practices in your AWS environment with AWS Config

4
Comments 4
8 min read
SSH and SCP with AWS SSM

SSH and SCP with AWS SSM

13
Comments 2
3 min read
Is there anything I should know about cookies as both webdev and end-user?

Is there anything I should know about cookies as both webdev and end-user?

6
Comments 2
1 min read
How to Automate Cyber Defense Without Paying a Dime

How to Automate Cyber Defense Without Paying a Dime

16
Comments
5 min read
Best Practices for Secure Session Management in Node

Best Practices for Secure Session Management in Node

99
Comments 2
8 min read
Analyzing Magecart Malware – From Zero to Hero

Analyzing Magecart Malware – From Zero to Hero

32
Comments 2
10 min read
Cyber wars: Defending your server

Cyber wars: Defending your server

38
Comments 4
4 min read
Hardening Craft CMS Permissions

Hardening Craft CMS Permissions

5
Comments
11 min read
What Is Entropy In Cryptography?

What Is Entropy In Cryptography?

11
Comments 1
3 min read
My Research paper on the 2017 Equifax Breach and potential AWS solutions

My Research paper on the 2017 Equifax Breach and potential AWS solutions

3
Comments
1 min read
Android Hack

Android Hack

2
Comments 1
2 min read
THIS IS UNSAFE (and a Bad Idea)

THIS IS UNSAFE (and a Bad Idea)

16
Comments 3
1 min read
How do you maintain your security and privacy?

How do you maintain your security and privacy?

8
Comments
2 min read
SkyHole: Privacy In A Digital Age

SkyHole: Privacy In A Digital Age

9
Comments
5 min read
IAM Policy to list an S3 bucket, except for the top-level (root) of the bucket

IAM Policy to list an S3 bucket, except for the top-level (root) of the bucket

10
Comments
3 min read
Hacking Random Generator (linear congruential generator)

Hacking Random Generator (linear congruential generator)

12
Comments
1 min read
0x00SEC CTF - Exercise #1

0x00SEC CTF - Exercise #1

48
Comments 2
5 min read
Protect your network resources with Azure Firewall

Protect your network resources with Azure Firewall

16
Comments
5 min read
To avoid being tracked, browse in multiverses

To avoid being tracked, browse in multiverses

73
Comments 6
4 min read
Lessons learned from surviving an application attack

Lessons learned from surviving an application attack

5
Comments 2
7 min read
Threat Modeling for Beginners

Threat Modeling for Beginners

22
Comments
5 min read
Securing and Storing Passwords

Securing and Storing Passwords

54
Comments 2
3 min read
Should email re-confirmation be a thing?

Should email re-confirmation be a thing?

6
Comments 2
1 min read
Force HTTPS for AWS EB behind a Load Balancer

Force HTTPS for AWS EB behind a Load Balancer

9
Comments 6
4 min read
Decoupling Ansible Secrets with Azure Key Vault

Decoupling Ansible Secrets with Azure Key Vault

31
Comments 2
11 min read
Fortifying your DigitalOcean Droplet

Fortifying your DigitalOcean Droplet

8
Comments
5 min read
loading...