DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Getting started with WebAuthn - The basic flow

Getting started with WebAuthn - The basic flow

9
Comments
11 min read
Jenkins: SAML Authentication with Okta and users groups

Jenkins: SAML Authentication with Okta and users groups

7
Comments 1
7 min read
"Sign in with Apple" implementation hurdles

"Sign in with Apple" implementation hurdles

16
Comments 2
9 min read
Oh, The Hats You'll Wear

Oh, The Hats You'll Wear

15
Comments
6 min read
Setting up Let's Encrypt with NGINX on Ubuntu

Setting up Let's Encrypt with NGINX on Ubuntu

11
Comments 1
3 min read
Here's why podman is more secured than Docker - DevSecOps

Here's why podman is more secured than Docker - DevSecOps

12
Comments
6 min read
Hack the wires

Hack the wires

26
Comments
3 min read
SQRL Poised To Save Us From Password Hell

SQRL Poised To Save Us From Password Hell

22
Comments 3
6 min read
The Development Trifecta: Three Questions Developers Should Be Asking Themselves All the Time

The Development Trifecta: Three Questions Developers Should Be Asking Themselves All the Time

9
Comments 1
4 min read
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

6
Comments
2 min read
Personal cybersecurity posture for when you're just this guy, you know?

Personal cybersecurity posture for when you're just this guy, you know?

81
Comments 15
7 min read
Let's Encrypt: Renew Wildcard Certificate With Certbot

Let's Encrypt: Renew Wildcard Certificate With Certbot

43
Comments 13
2 min read
AJAX History & Modern Security

AJAX History & Modern Security

56
Comments 3
4 min read
Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

Sodium-Plus: A Positive Cryptography Experience for JavaScript Developers

45
Comments 1
5 min read
The Top 6 Mobile API Protection Techniques - Are They Enough?

The Top 6 Mobile API Protection Techniques - Are They Enough?

39
Comments
12 min read
This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

7
Comments 5
2 min read
Engaging in OverTheWire's Wargames

Engaging in OverTheWire's Wargames

12
Comments 1
3 min read
Building towards a web without passwords

Building towards a web without passwords

21
Comments 1
5 min read
Signed Git commits in VS Code

Signed Git commits in VS Code

238
Comments 32
5 min read
Root-Me - Xor Madness - Walkthrough

Root-Me - Xor Madness - Walkthrough

8
Comments
3 min read
Attackers exploit 0day vulnerability that gives full control of Android phones

Attackers exploit 0day vulnerability that gives full control of Android phones

6
Comments 2
2 min read
Simple Intro to JWT Basics

Simple Intro to JWT Basics

198
Comments 8
8 min read
Secure application architecture basics: separation, configuration, and access

Secure application architecture basics: separation, configuration, and access

134
Comments 3
7 min read
Part 2: Classic Encryption Algorithms - Mono-alphabetic Substitution Ciphers

Part 2: Classic Encryption Algorithms - Mono-alphabetic Substitution Ciphers

9
Comments
12 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

36
Comments 1
9 min read
The iOS Checkm8 jailbreak is hugely significant, but not for you

The iOS Checkm8 jailbreak is hugely significant, but not for you

5
Comments
1 min read
Is your Mobile App Leaking Secrets?

Is your Mobile App Leaking Secrets?

15
Comments 4
4 min read
Fixing version not approved on Habitica-Chat-Extension (FireFox)

Fixing version not approved on Habitica-Chat-Extension (FireFox)

6
Comments
4 min read
Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

Pushing Left, Like a Boss - Part 10: Special AppSec Activities and Situations

11
Comments
2 min read
Part 1: Introduction to Cryptography

Part 1: Introduction to Cryptography

19
Comments 2
6 min read
Okta: SSO authentication for Gmail and Slack

Okta: SSO authentication for Gmail and Slack

8
Comments
3 min read
Sending your Threat Indicators to Azure Sentinel

Sending your Threat Indicators to Azure Sentinel

6
Comments
5 min read
Creepin' with Maltego

Creepin' with Maltego

9
Comments
3 min read
Unfixable iOS Vulnerability Affects 7 Generations of Devices

Unfixable iOS Vulnerability Affects 7 Generations of Devices

25
Comments 2
2 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

20
Comments
3 min read
Add Sec to your DevOps Pipeline with Checkmarx

Add Sec to your DevOps Pipeline with Checkmarx

14
Comments
4 min read
What do you use for password management?

What do you use for password management?

85
Comments 152
1 min read
Azure Functions Security: Best Practices

Azure Functions Security: Best Practices

22
Comments
9 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
JSON Web Tokens (JWT) vs. SessionID 🔐 ? explained in 2 mins

JSON Web Tokens (JWT) vs. SessionID 🔐 ? explained in 2 mins

303
Comments 17
2 min read
Use bcrypt to campare passwords using nodejs

Use bcrypt to campare passwords using nodejs

9
Comments 1
1 min read
Add Password Protection To Word Or PDF Files In C#

Add Password Protection To Word Or PDF Files In C#

3
Comments
1 min read
Get Started with the ELK Stack

Get Started with the ELK Stack

17
Comments 1
10 min read
How to set up Metasploitable 3 on macOS Mojave

How to set up Metasploitable 3 on macOS Mojave

8
Comments 1
4 min read
Pushing Left, Like a Boss - Part 9: An AppSec Program

Pushing Left, Like a Boss - Part 9: An AppSec Program

13
Comments
1 min read
OWASP API Security Top 10 2019

OWASP API Security Top 10 2019

11
Comments
1 min read
Javascript Development & Security

Javascript Development & Security

8
Comments
3 min read
If you were tasked to conduct a security audit on a server/database-backed web app, where would you start?

If you were tasked to conduct a security audit on a server/database-backed web app, where would you start?

169
Comments 40
1 min read
Hack the Vote (not really though)

Hack the Vote (not really though)

4
Comments
4 min read
They can't hack your servers if you don't have any servers, right?

They can't hack your servers if you don't have any servers, right?

15
Comments 2
7 min read
Pushing Left, Like a Boss - Part 8: Testing

Pushing Left, Like a Boss - Part 8: Testing

18
Comments
1 min read
Passing Environment Variables with Sudo

Passing Environment Variables with Sudo

7
Comments
1 min read
{Safest Operating System}

{Safest Operating System}

5
Comments 7
1 min read
3 Hypothetical Security Hacks and Discussion

3 Hypothetical Security Hacks and Discussion

35
Comments
3 min read
What would it take to increase the password max length limit?

What would it take to increase the password max length limit?

12
Comments 9
4 min read
My thoughts about using a VPN during everyday life

My thoughts about using a VPN during everyday life

12
Comments 6
4 min read
10 Java security best practices

10 Java security best practices

63
Comments
6 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

49
Comments 2
1 min read
AWS access keys — 5 Tips To Safely Use Them.

AWS access keys — 5 Tips To Safely Use Them.

19
Comments 4
5 min read
Filtración masiva de datos en Ecuador.

Filtración masiva de datos en Ecuador.

4
Comments
6 min read
loading...