DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Speakeasy Door to Your Network - Port Knocking (2)

The Speakeasy Door to Your Network - Port Knocking (2)

Comments
4 min read
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Security Threat Detection in DevSecOps

Security Threat Detection in DevSecOps

2
Comments
2 min read
Fix Insufficient Logging & Monitoring in Laravel Easily

Fix Insufficient Logging & Monitoring in Laravel Easily

2
Comments
3 min read
Event Recap: OWASP Atlanta Meetup – The State of Secure Code + Tournament

Event Recap: OWASP Atlanta Meetup – The State of Secure Code + Tournament

Comments
2 min read
Why Cloud Security Needs a New Playbook: Introducing CNAMM

Why Cloud Security Needs a New Playbook: Introducing CNAMM

Comments
4 min read
Professional TypeScript: Improve Type Safety with Branded Types

Professional TypeScript: Improve Type Safety with Branded Types

Comments
5 min read
Conhecendo OSINT

Conhecendo OSINT

Comments
3 min read
𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

Comments
1 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

Comments
2 min read
Protect contact email from bots

Protect contact email from bots

1
Comments
2 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
Don’t Let Your Code Become the Titanic

Don’t Let Your Code Become the Titanic

Comments
4 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
Event Recap: SOSS: Fusion Conference

Event Recap: SOSS: Fusion Conference

Comments
2 min read
Importando certificado SSL no cacerts, via KeyStore Explorer

Importando certificado SSL no cacerts, via KeyStore Explorer

Comments
1 min read
Avoiding Production Disasters with npm ci: The Key to Stable Deployments

Avoiding Production Disasters with npm ci: The Key to Stable Deployments

6
Comments 1
3 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
loading...