DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.

Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.

Comments 1
9 min read
Build An Advanced Password Cracker With Python (Complete Guide)

Build An Advanced Password Cracker With Python (Complete Guide)

9
Comments
8 min read
Secure Data Stack: Navigating Adoption Challenges of Data Encryption

Secure Data Stack: Navigating Adoption Challenges of Data Encryption

1
Comments
5 min read
Boost Your Git Workflow: Adding SSH Keys for Secure Repository Access

Boost Your Git Workflow: Adding SSH Keys for Secure Repository Access

Comments
3 min read
CĂłmo Compartir un Secreto: Desglosando el MĂ©todo de Adi Shamir para la Seguridad de Datos

CĂłmo Compartir un Secreto: Desglosando el MĂ©todo de Adi Shamir para la Seguridad de Datos

Comments
4 min read
Defense in Depth approach using AWS

Defense in Depth approach using AWS

5
Comments 2
12 min read
Node.js to support ESM Require: What this means for NestJS developers and other CommonJS frameworks

Node.js to support ESM Require: What this means for NestJS developers and other CommonJS frameworks

5
Comments
8 min read
Enhancing Frontend Security: Protecting Your Applications from Modern Threats

Enhancing Frontend Security: Protecting Your Applications from Modern Threats

Comments
2 min read
Passwords: Are they going extinct?

Passwords: Are they going extinct?

6
Comments
6 min read
The Day a DDOS Attack Led to the Most Awkward Hello World

The Day a DDOS Attack Led to the Most Awkward Hello World

15
Comments
2 min read
Issue 63 of AWS Cloud Security Weekly

Issue 63 of AWS Cloud Security Weekly

5
Comments
3 min read
More Secure JWT | A Better Experience

More Secure JWT | A Better Experience

8
Comments
6 min read
Secure AWS API Gateway with IAM

Secure AWS API Gateway with IAM

1
Comments
3 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

13
Comments
4 min read
Security news weekly round-up - 4th October 2024

Security news weekly round-up - 4th October 2024

1
Comments
3 min read
Introduction to System Design: A Beginner-Friendly Guide

Introduction to System Design: A Beginner-Friendly Guide

5
Comments
6 min read
Project Overview: AWS Inspector in Jenkins Pipeline

Project Overview: AWS Inspector in Jenkins Pipeline

15
Comments
3 min read
How to Use Secrets in GitHub Actions Workflows

How to Use Secrets in GitHub Actions Workflows

13
Comments 1
4 min read
Build Your First Port Scanner using Python in 2024

Build Your First Port Scanner using Python in 2024

9
Comments 2
5 min read
Mastering Authentication in Node.js and Express: A Comprehensive Guide

Mastering Authentication in Node.js and Express: A Comprehensive Guide

1
Comments
4 min read
Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

1
Comments
6 min read
Cybersecurity Erosion: Addressing the Hidden Threat to Long-Term Security

Cybersecurity Erosion: Addressing the Hidden Threat to Long-Term Security

2
Comments 1
4 min read
Cybersecurity Awareness Month: Stay Safe Online

Cybersecurity Awareness Month: Stay Safe Online

1
Comments
3 min read
Can you run an AWS command from Slack, without any AWS credentials? Let’s find out!

Can you run an AWS command from Slack, without any AWS credentials? Let’s find out!

5
Comments 1
4 min read
How to delete pods with kubectl in Kubernetes

How to delete pods with kubectl in Kubernetes

10
Comments
3 min read
Implementing an AWS Client VPN Solution

Implementing an AWS Client VPN Solution

Comments
2 min read
Using the Link block

Using the Link block

Comments
5 min read
How to Ensure Your Full Stack JavaScript Apps Meet Security Standards

How to Ensure Your Full Stack JavaScript Apps Meet Security Standards

2
Comments
7 min read
Opaque token vs JWT

Opaque token vs JWT

27
Comments
7 min read
AWS IAM User Access Keys are a force to be reckoned with & This is how it is done, on exposure !!

AWS IAM User Access Keys are a force to be reckoned with & This is how it is done, on exposure !!

1
Comments
3 min read
DKIM, DMARC and SPF: The protective shield for your email communication 🛡️

DKIM, DMARC and SPF: The protective shield for your email communication 🛡️

1
Comments
5 min read
DevOps Prerequisite (Part 9): SSL and TLS

DevOps Prerequisite (Part 9): SSL and TLS

Comments
5 min read
Good Security Boosts Your Flow

Good Security Boosts Your Flow

Comments
7 min read
Pulsar preventing vulnerabilities #1 — polkit (CVE-2021–4034)

Pulsar preventing vulnerabilities #1 — polkit (CVE-2021–4034)

Comments
4 min read
Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Comments
7 min read
Issue 61 of AWS Cloud Security Weekly

Issue 61 of AWS Cloud Security Weekly

1
Comments
2 min read
Securing and enhancing LLM prompts & outputs: A guide using Amazon Bedrock Guardrails and open-source solutions

Securing and enhancing LLM prompts & outputs: A guide using Amazon Bedrock Guardrails and open-source solutions

14
Comments 1
14 min read
Issue 64 of AWS Cloud Security Weekly

Issue 64 of AWS Cloud Security Weekly

3
Comments
3 min read
How to Use Nmap & Zenmap for Network Security Scanning

How to Use Nmap & Zenmap for Network Security Scanning

4
Comments
4 min read
Secure Your Website: Best Practices for AWS Deployment

Secure Your Website: Best Practices for AWS Deployment

1
Comments
4 min read
Insights on Securing Your Kubernetes Cluster with Falco 🚀🔒

Insights on Securing Your Kubernetes Cluster with Falco 🚀🔒

Comments
5 min read
Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Comments
15 min read
Secure Your Data with Entity Framework Core Encryption

Secure Your Data with Entity Framework Core Encryption

2
Comments 1
5 min read
Red Teaming for Responsible AI

Red Teaming for Responsible AI

4
Comments
4 min read
Proxmox Network Storage: Firewall Rules

Proxmox Network Storage: Firewall Rules

2
Comments
3 min read
Pentesting AWS Cognito: User Authentication Risks

Pentesting AWS Cognito: User Authentication Risks

Comments
12 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Protecting your Fintech App Customers further with Panic Password

Protecting your Fintech App Customers further with Panic Password

3
Comments
3 min read
How to disable root ssh login in Linux

How to disable root ssh login in Linux

Comments
1 min read
Handling JWT Authentications Securely: Pitfalls and Best Practices

Handling JWT Authentications Securely: Pitfalls and Best Practices

5
Comments
3 min read
The backbone of the internet: understanding protocol

The backbone of the internet: understanding protocol

Comments
4 min read
AWS: IAM Access Analyzer policy generation — create an IAM Policy

AWS: IAM Access Analyzer policy generation — create an IAM Policy

Comments
6 min read
AWS Security Group Rules

AWS Security Group Rules

Comments
2 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

11
Comments
3 min read
LINUX Systems Under Attack via Printing System (CUPS)

LINUX Systems Under Attack via Printing System (CUPS)

4
Comments
5 min read
Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Comments
3 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

3
Comments
2 min read
Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
loading...