DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OpenVPN: the No route to host and ERR_ADDRESS_UNREACHABLE errors – the cause and a solution

OpenVPN: the No route to host and ERR_ADDRESS_UNREACHABLE errors – the cause and a solution

6
Comments
3 min read
Security Testing using BDD Security

Security Testing using BDD Security

13
Comments
2 min read
NestJS authentication for server side rendering with Handlebars

NestJS authentication for server side rendering with Handlebars

5
Comments
4 min read
ULID in GO Lang

ULID in GO Lang

3
Comments
1 min read
Firestore Rules Examples – Must-Know Patterns To Secure Your Data

Firestore Rules Examples – Must-Know Patterns To Secure Your Data

22
Comments 7
4 min read
Ghidra Scripting: Annotating Linux system calls

Ghidra Scripting: Annotating Linux system calls

8
Comments
3 min read
Token vs Session Authentication

Token vs Session Authentication

149
Comments 11
2 min read
Security audit for your online devices

Security audit for your online devices

4
Comments
1 min read
Did your WordPress site get hacked? Find out what to do next!

Did your WordPress site get hacked? Find out what to do next!

6
Comments
10 min read
Getting started with WebAuthn - The basic flow

Getting started with WebAuthn - The basic flow

9
Comments
11 min read
Jenkins: SAML Authentication with Okta and users groups

Jenkins: SAML Authentication with Okta and users groups

7
Comments 1
7 min read
"Sign in with Apple" implementation hurdles

"Sign in with Apple" implementation hurdles

16
Comments 2
9 min read
Setting up Let's Encrypt with NGINX on Ubuntu

Setting up Let's Encrypt with NGINX on Ubuntu

11
Comments 1
3 min read
Oh, The Hats You'll Wear

Oh, The Hats You'll Wear

15
Comments
6 min read
Here's why podman is more secured than Docker - DevSecOps

Here's why podman is more secured than Docker - DevSecOps

12
Comments
6 min read
Hack the wires

Hack the wires

26
Comments
3 min read
SQRL Poised To Save Us From Password Hell

SQRL Poised To Save Us From Password Hell

22
Comments 3
6 min read
The Development Trifecta: Three Questions Developers Should Be Asking Themselves All the Time

The Development Trifecta: Three Questions Developers Should Be Asking Themselves All the Time

9
Comments 1
4 min read
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

6
Comments
2 min read
Personal cybersecurity posture for when you're just this guy, you know?

Personal cybersecurity posture for when you're just this guy, you know?

81
Comments 15
7 min read
Let's Encrypt: Renew Wildcard Certificate With Certbot

Let's Encrypt: Renew Wildcard Certificate With Certbot

41
Comments 13
2 min read
AJAX History & Modern Security

AJAX History & Modern Security

56
Comments 3
4 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
The Top 6 Mobile API Protection Techniques - Are They Enough?

The Top 6 Mobile API Protection Techniques - Are They Enough?

39
Comments
12 min read
This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

7
Comments 5
2 min read
Engaging in OverTheWire's Wargames

Engaging in OverTheWire's Wargames

12
Comments 1
3 min read
Building towards a web without passwords

Building towards a web without passwords

21
Comments 1
5 min read
Signed Git commits in VS Code

Signed Git commits in VS Code

236
Comments 32
5 min read
Root-Me - Xor Madness - Walkthrough

Root-Me - Xor Madness - Walkthrough

8
Comments
3 min read
Attackers exploit 0day vulnerability that gives full control of Android phones

Attackers exploit 0day vulnerability that gives full control of Android phones

6
Comments 2
2 min read
Simple Intro to JWT Basics

Simple Intro to JWT Basics

198
Comments 8
8 min read
Secure application architecture basics: separation, configuration, and access

Secure application architecture basics: separation, configuration, and access

134
Comments 3
7 min read
Part 2: Classic Encryption Algorithms - Mono-alphabetic Substitution Ciphers

Part 2: Classic Encryption Algorithms - Mono-alphabetic Substitution Ciphers

9
Comments
12 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

36
Comments 1
9 min read
The iOS Checkm8 jailbreak is hugely significant, but not for you

The iOS Checkm8 jailbreak is hugely significant, but not for you

5
Comments
1 min read
Is your Mobile App Leaking Secrets?

Is your Mobile App Leaking Secrets?

15
Comments 4
4 min read
Fixing version not approved on Habitica-Chat-Extension (FireFox)

Fixing version not approved on Habitica-Chat-Extension (FireFox)

6
Comments
4 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

11
Comments
2 min read
Part 1: Introduction to Cryptography

Part 1: Introduction to Cryptography

19
Comments 2
6 min read
Okta: SSO authentication for Gmail and Slack

Okta: SSO authentication for Gmail and Slack

8
Comments
3 min read
Sending your Threat Indicators to Azure Sentinel

Sending your Threat Indicators to Azure Sentinel

6
Comments
5 min read
Creepin' with Maltego

Creepin' with Maltego

9
Comments
3 min read
Unfixable iOS Vulnerability Affects 7 Generations of Devices

Unfixable iOS Vulnerability Affects 7 Generations of Devices

25
Comments 2
2 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

20
Comments
3 min read
Add Sec to your DevOps Pipeline with Checkmarx

Add Sec to your DevOps Pipeline with Checkmarx

14
Comments
4 min read
What do you use for password management?

What do you use for password management?

85
Comments 152
1 min read
Azure Functions Security: Best Practices

Azure Functions Security: Best Practices

22
Comments
9 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
JSON Web Tokens (JWT) vs. SessionID 🔐 ? explained in 2 mins

JSON Web Tokens (JWT) vs. SessionID 🔐 ? explained in 2 mins

303
Comments 17
2 min read
Use bcrypt to campare passwords using nodejs

Use bcrypt to campare passwords using nodejs

9
Comments 1
1 min read
Add Password Protection To Word Or PDF Files In C#

Add Password Protection To Word Or PDF Files In C#

3
Comments
1 min read
Get Started with the ELK Stack

Get Started with the ELK Stack

17
Comments 1
10 min read
How to set up Metasploitable 3 on macOS Mojave

How to set up Metasploitable 3 on macOS Mojave

8
Comments 1
4 min read
Pushing Left, Like a Boss - Part 9: An AppSec Program

Pushing Left, Like a Boss - Part 9: An AppSec Program

13
Comments
1 min read
OWASP API Security Top 10 2019

OWASP API Security Top 10 2019

11
Comments
1 min read
Javascript Development & Security

Javascript Development & Security

8
Comments
3 min read
If you were tasked to conduct a security audit on a server/database-backed web app, where would you start?

If you were tasked to conduct a security audit on a server/database-backed web app, where would you start?

169
Comments 40
1 min read
Hack the Vote (not really though)

Hack the Vote (not really though)

4
Comments
4 min read
They can't hack your servers if you don't have any servers, right?

They can't hack your servers if you don't have any servers, right?

15
Comments 2
7 min read
Pushing Left, Like a Boss - Part 8: Testing

Pushing Left, Like a Boss - Part 8: Testing

18
Comments
1 min read
loading...