DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
How to easily fix OpenSSH RegreSSHion vulnerability

How to easily fix OpenSSH RegreSSHion vulnerability

Comments
2 min read
How to test and secure a mail server in Debian and Ubuntu with ispmanager

How to test and secure a mail server in Debian and Ubuntu with ispmanager

6
Comments
10 min read
Why Python Is Good For Cybersecurity

Why Python Is Good For Cybersecurity

9
Comments 2
4 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
2 min read
Enhancing Data Security with AES Encryption in Java 🚀🔒

Enhancing Data Security with AES Encryption in Java 🚀🔒

Comments
2 min read
How To Stop Form Bots With Honeypot Fields

How To Stop Form Bots With Honeypot Fields

32
Comments 13
3 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 1

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 1

14
Comments
3 min read
Challenge with RBAC Authentication

Challenge with RBAC Authentication

2
Comments
2 min read
How to provision an AWS WAF using AWS CDK

How to provision an AWS WAF using AWS CDK

2
Comments
4 min read
CAPTCHA: Security Theater or AI Training Tool?

CAPTCHA: Security Theater or AI Training Tool?

Comments
4 min read
Docker Images for Go (Golang) Small, Faster Docker Images and Security

Docker Images for Go (Golang) Small, Faster Docker Images and Security

29
Comments 1
4 min read
Configuring a Microsoft Sentinel Environment (Part 1)

Configuring a Microsoft Sentinel Environment (Part 1)

Comments
2 min read
Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)

Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)

Comments
2 min read
Enhancing Your Microsoft Sentinel Environment with Content Hub Solution (Part 2)

Enhancing Your Microsoft Sentinel Environment with Content Hub Solution (Part 2)

Comments
3 min read
Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)

Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)

Comments
3 min read
Managing NixOS Secrets via SOPS, sops-nix and opsops

Managing NixOS Secrets via SOPS, sops-nix and opsops

2
Comments
5 min read
How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide

How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide

2
Comments
3 min read
NPM packages leveraged for cryptocurrency theft

NPM packages leveraged for cryptocurrency theft

8
Comments
5 min read
What You ACTUALLY Need To Know For A Cybersecurity Job

What You ACTUALLY Need To Know For A Cybersecurity Job

31
Comments 4
4 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
SharePoint solutions as a spyware

SharePoint solutions as a spyware

1
Comments
6 min read
Automated ways to security audit your website

Automated ways to security audit your website

32
Comments 1
6 min read
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Comments
4 min read
Understanding SSL/TLS in Kubernetes

Understanding SSL/TLS in Kubernetes

1
Comments
3 min read
How private are your class #private fields?

How private are your class #private fields?

Comments
3 min read
From ground to production: Deploying Workload Identities on AKS

From ground to production: Deploying Workload Identities on AKS

3
Comments 1
8 min read
From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

Comments
5 min read
🛡️ Key cybersecurity threats in 2024: What should businesses know?

🛡️ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

3
Comments
2 min read
How to Keep Consumer Data Secure on Your E-Commerce Website

How to Keep Consumer Data Secure on Your E-Commerce Website

1
Comments
5 min read
Code Smell 260 - Crowdstrike NULL

Code Smell 260 - Crowdstrike NULL

6
Comments
3 min read
6 Tools To Collect Anonymous Team Feedback

6 Tools To Collect Anonymous Team Feedback

Comments
2 min read
Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

1
Comments
11 min read
Hacking Access to Power Automate

Hacking Access to Power Automate

74
Comments 1
8 min read
The Case for Standards in Mobile App Security

The Case for Standards in Mobile App Security

4
Comments 1
4 min read
Download a Website Certificate

Download a Website Certificate

1
Comments
2 min read
Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

2
Comments
3 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

1
Comments
4 min read
AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

1
Comments
8 min read
Using Amazon Cognito with the user-password flow

Using Amazon Cognito with the user-password flow

4
Comments
8 min read
Using 1Password with External Secrets Operator in a GitOps way

Using 1Password with External Secrets Operator in a GitOps way

9
Comments
7 min read
Issue 55 of AWS Cloud Security Weekly

Issue 55 of AWS Cloud Security Weekly

3
Comments
1 min read
What's the Difference Between Session-Based Authentication and JWTs?

What's the Difference Between Session-Based Authentication and JWTs?

2
Comments
3 min read
Resourcely founder-led in person or virtual hands-on workshop

Resourcely founder-led in person or virtual hands-on workshop

Comments
1 min read
How to decode a JWT

How to decode a JWT

1
Comments
1 min read
How to Deploy Infisical to Manage Application Secrets on Koyeb

How to Deploy Infisical to Manage Application Secrets on Koyeb

Comments
11 min read
Need Help with Nodemailer Access Issues on Outlook and Gmail

Need Help with Nodemailer Access Issues on Outlook and Gmail

Comments
1 min read
CrowdStrike Software Update Leads to Significant Global Tech Outage

CrowdStrike Software Update Leads to Significant Global Tech Outage

Comments
3 min read
Serverless Security - Cognito Misconfigurations

Serverless Security - Cognito Misconfigurations

8
Comments 1
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans

The Data Security Duo: Data Encryption and Vulnerability Scans

1
Comments
5 min read
Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager

Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager

3
Comments 2
3 min read
Making SharePoint Online even more secure

Making SharePoint Online even more secure

6
Comments
1 min read
2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

Comments
6 min read
Kubernetes CIS Benchmarking Tool : Day 17 of 50 days DevOps Tools Series

Kubernetes CIS Benchmarking Tool : Day 17 of 50 days DevOps Tools Series

Comments
3 min read
Authentication & Authorization: The Backbone of Secure Systems 🛡

Authentication & Authorization: The Backbone of Secure Systems 🛡

Comments
3 min read
Api Rest .Net completa com JwtToken, integração com api ViaCep utilizando padrão de arquitetura clean architecture

Api Rest .Net completa com JwtToken, integração com api ViaCep utilizando padrão de arquitetura clean architecture

2
Comments
9 min read
Understanding network virtualization and how it helps in day-to-day infrastructure.

Understanding network virtualization and how it helps in day-to-day infrastructure.

Comments
5 min read
Security news weekly round-up - 26th July 2024

Security news weekly round-up - 26th July 2024

Comments
3 min read
loading...