DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What Dev Teams Should Know about DevSecOps

What Dev Teams Should Know about DevSecOps

11
Comments
3 min read
Securing your docker images with Github actions for FREE!

Securing your docker images with Github actions for FREE!

52
Comments
2 min read
How to Extract an API Key from a Mobile App by Static Binary Analysis

How to Extract an API Key from a Mobile App by Static Binary Analysis

13
Comments 2
8 min read
What fields your User entity needs

What fields your User entity needs

10
Comments
3 min read
📖 Case Study: ⚙️ Reverse Engineering using Node JS 👾

📖 Case Study: ⚙️ Reverse Engineering using Node JS 👾

52
Comments 6
3 min read
How to Protect Your WordPress Site from Getting Hacked

How to Protect Your WordPress Site from Getting Hacked

14
Comments 1
11 min read
3 minutes 21 seconds vs 10000 years - Google's Quantum Supremacy Claim 🔥 💥👇

3 minutes 21 seconds vs 10000 years - Google's Quantum Supremacy Claim 🔥 💥👇

34
Comments 12
1 min read
Security in times of Docker & K8s; tech debt; & embedded integration frameworks

Security in times of Docker & K8s; tech debt; & embedded integration frameworks

42
Comments 4
3 min read
How to make APIs fast & secure, plus tips for REST APIs

How to make APIs fast & secure, plus tips for REST APIs

62
Comments
2 min read
What happens to our data when we die?

What happens to our data when we die?

32
Comments 1
3 min read
Introducing Certera

Introducing Certera

8
Comments
4 min read
Checking for vulnerabilities on your Java projects

Checking for vulnerabilities on your Java projects

7
Comments
2 min read
Phoenix and Elixir integration guide for passwordless authentication with Kno

Phoenix and Elixir integration guide for passwordless authentication with Kno

8
Comments
8 min read
Note Taking App - Make your notes saved securely

Note Taking App - Make your notes saved securely

4
Comments
2 min read
Secure Your SPA with Authorization Code Flow with PKCE

Secure Your SPA with Authorization Code Flow with PKCE

8
Comments
5 min read
New PHP vulnerability - CVE-2019-11043

New PHP vulnerability - CVE-2019-11043

4
Comments
1 min read
PicoCTF 2019: Cereal Hacker 2 (500p)

PicoCTF 2019: Cereal Hacker 2 (500p)

9
Comments
4 min read
Timing Attacks and the Timing-Allow-Origin Header

Timing Attacks and the Timing-Allow-Origin Header

6
Comments
2 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

13
Comments
2 min read
Do you ever read "Terms and Conditions" and/or "Privacy Policies"?

Do you ever read "Terms and Conditions" and/or "Privacy Policies"?

6
Comments 12
1 min read
Root-Me: GB - Basic GameBoy crackme walkthrough

Root-Me: GB - Basic GameBoy crackme walkthrough

7
Comments
2 min read
Is Blockchain Wallet Safe

Is Blockchain Wallet Safe

3
Comments 2
1 min read
Weekly Links #10 #11

Weekly Links #10 #11

4
Comments
2 min read
How I Fixed JWT Security Flaws in 3 Steps

How I Fixed JWT Security Flaws in 3 Steps

279
Comments 43
4 min read
Hacktoberfest and privacy concerns

Hacktoberfest and privacy concerns

8
Comments 3
2 min read
Environmental Variables & Hiding Sensitive Information in Ruby

Environmental Variables & Hiding Sensitive Information in Ruby

20
Comments
3 min read
Okta: G-Suite integration – provisioning and users import and export

Okta: G-Suite integration – provisioning and users import and export

5
Comments
7 min read
Linux security

Linux security

41
Comments
2 min read
Be careful with Docker ports!

Be careful with Docker ports!

13
Comments 18
3 min read
Improving your WordPress development experience

Improving your WordPress development experience

11
Comments
4 min read
Hide Your Keys Hide Your Wife!

Hide Your Keys Hide Your Wife!

12
Comments
5 min read
Why Does Your Mobile App Need An Api Key?

Why Does Your Mobile App Need An Api Key?

11
Comments 2
10 min read
New Cyberspace Search Engine

New Cyberspace Search Engine

16
Comments
3 min read
Github: SAML, Okta, and Github Enterprise Cloud – Organization SSO configuration

Github: SAML, Okta, and Github Enterprise Cloud – Organization SSO configuration

5
Comments
5 min read
Why sign-in with apple may take you more than 5 minutes and how it works?

Why sign-in with apple may take you more than 5 minutes and how it works?

8
Comments 1
4 min read
How to Detect and Fix WordPress Malware Redirect Hack

How to Detect and Fix WordPress Malware Redirect Hack

12
Comments 1
13 min read
My Career Story

My Career Story

77
Comments 11
6 min read
Managing Credentials

Managing Credentials

15
Comments 7
2 min read
I am a Developer Advocate for Security in Mobile Apps and APIs, Ask Me Anything

I am a Developer Advocate for Security in Mobile Apps and APIs, Ask Me Anything

11
Comments 26
1 min read
Awesome Frontend Security

Awesome Frontend Security

9
Comments
1 min read
10 steps for securing a PHP app

10 steps for securing a PHP app

137
Comments 7
3 min read
Is a Master's Degree Worth It?

Is a Master's Degree Worth It?

12
Comments 5
5 min read
Why Opera Browser is Using Webcam?

Why Opera Browser is Using Webcam?

10
Comments 5
1 min read
My First CTF Writeup : KPMG Cyber Security Challenge 2019

My First CTF Writeup : KPMG Cyber Security Challenge 2019

18
Comments
5 min read
How To Stop Account Hijacking

How To Stop Account Hijacking

7
Comments
3 min read
Introducing Aberrant Authentication

Introducing Aberrant Authentication

7
Comments
2 min read
Best practices for Kubernetes security; scaling write-heavy productions; & SRE

Best practices for Kubernetes security; scaling write-heavy productions; & SRE

22
Comments
2 min read
Jenkins: SAML, Okta, user groups, and Role-Based Security plugin

Jenkins: SAML, Okta, user groups, and Role-Based Security plugin

6
Comments 1
5 min read
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

8
Comments 1
1 min read
Ruby Dotenv

Ruby Dotenv

9
Comments 2
2 min read
Virtualization for Practical Local Security

Virtualization for Practical Local Security

9
Comments
8 min read
OpenVPN: the No route to host and ERR_ADDRESS_UNREACHABLE errors – the cause and a solution

OpenVPN: the No route to host and ERR_ADDRESS_UNREACHABLE errors – the cause and a solution

6
Comments
3 min read
Security Testing using BDD Security

Security Testing using BDD Security

13
Comments
2 min read
NestJS authentication for server side rendering with Handlebars

NestJS authentication for server side rendering with Handlebars

5
Comments
4 min read
ULID in GO Lang

ULID in GO Lang

3
Comments
1 min read
Firestore Rules Examples – Must-Know Patterns To Secure Your Data

Firestore Rules Examples – Must-Know Patterns To Secure Your Data

22
Comments 7
4 min read
Ghidra Scripting: Annotating Linux system calls

Ghidra Scripting: Annotating Linux system calls

8
Comments
3 min read
Token vs Session Authentication

Token vs Session Authentication

149
Comments 11
2 min read
Security audit for your online devices

Security audit for your online devices

4
Comments
1 min read
Did your WordPress site get hacked? Find out what to do next!

Did your WordPress site get hacked? Find out what to do next!

6
Comments
10 min read
loading...