DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Jackson Deserialization Vulnerability

Jackson Deserialization Vulnerability

13
Comments
2 min read
Home Security System with low cost

Home Security System with low cost

7
Comments 9
2 min read
🛠 Setup WildFly SSL

🛠 Setup WildFly SSL

9
Comments
2 min read
Use Auth0 to secure your NestJS application

Use Auth0 to secure your NestJS application

65
Comments 6
7 min read
American Kingpin: A Software Crime Thriller

American Kingpin: A Software Crime Thriller

146
Comments 10
1 min read
Introduction to Angr

Introduction to Angr

3
Comments
4 min read
Security in Dependencies

Security in Dependencies

4
Comments
4 min read
Managing Server Access, SSH Keys and our solution!

Managing Server Access, SSH Keys and our solution!

11
Comments 2
5 min read
npm security tips to keep you safe of malicious modules

npm security tips to keep you safe of malicious modules

52
Comments 1
2 min read
5 Reasons that Depict the Importance of Code Reviews

5 Reasons that Depict the Importance of Code Reviews

12
Comments
4 min read
How we mitigated one of the largest CC (DDoS) attacks

How we mitigated one of the largest CC (DDoS) attacks

7
Comments 1
3 min read
Why should you use "noopener"? Beware of security Flaws.

Why should you use "noopener"? Beware of security Flaws.

100
Comments 8
4 min read
8 Best WordPress Malware Scanners in 2024[Updated]

8 Best WordPress Malware Scanners in 2024[Updated]

11
Comments 2
7 min read
Cryptography git commits

Cryptography git commits

62
Comments 2
5 min read
How much github is secure?

How much github is secure?

5
Comments 1
1 min read
Shamir's Secret Sharing Scheme in JavaScript

Shamir's Secret Sharing Scheme in JavaScript

20
Comments 3
2 min read
Secure Your Node.js Application With JSON Web Token

Secure Your Node.js Application With JSON Web Token

166
Comments 13
5 min read
JS&Friends Conf: DevOps+IoT+Security - Diana Rodriguez

JS&Friends Conf: DevOps+IoT+Security - Diana Rodriguez

4
Comments
3 min read
Improving Form and AJAX Security

Improving Form and AJAX Security

12
Comments
13 min read
A 12 Point Web Hosting Security Checklist 2024

A 12 Point Web Hosting Security Checklist 2024

10
Comments 3
11 min read
A Bank Should Authenticate With You - And Vice Versa

A Bank Should Authenticate With You - And Vice Versa

12
Comments 5
4 min read
What are the worst security practices you've ever witnessed?

What are the worst security practices you've ever witnessed?

90
Comments 169
1 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
localStorage VS sessionStorage

localStorage VS sessionStorage

20
Comments 1
3 min read
Pushing Left, Like a Boss — Part 5.8 — Securing Your Cookies

Pushing Left, Like a Boss — Part 5.8 — Securing Your Cookies

36
Comments
1 min read
Securing containers with proxy reverses

Securing containers with proxy reverses

9
Comments
6 min read
Using JWT-Authentication (Auth0) with NestJS 🔐

Using JWT-Authentication (Auth0) with NestJS 🔐

13
Comments 2
1 min read
Stop with the Obfuscation: Encoding and Encryption are Not the Same

Stop with the Obfuscation: Encoding and Encryption are Not the Same

13
Comments 1
2 min read
Don't be tracked ⚙️ Tweak the Firefox configurations

Don't be tracked ⚙️ Tweak the Firefox configurations

38
Comments
3 min read
Android Security: Don't leave WebView debugging enabled in production

Android Security: Don't leave WebView debugging enabled in production

4
Comments 2
1 min read
How To Sign Your Commits On GitHub With GPG.

How To Sign Your Commits On GitHub With GPG.

68
Comments 6
8 min read
That Time I Shipped Insecure Code

That Time I Shipped Insecure Code

15
Comments 2
6 min read
So Many Auths!

So Many Auths!

9
Comments
6 min read
Making the website secure by adding additional HTTP headers in Netlify (and Zeit Now)

Making the website secure by adding additional HTTP headers in Netlify (and Zeit Now)

8
Comments
4 min read
What is JWT? how to create one?

What is JWT? how to create one?

8
Comments
3 min read
Generating 2FA One-Time Passwords in JS Using Web Crypto API

Generating 2FA One-Time Passwords in JS Using Web Crypto API

86
Comments 9
11 min read
How To Secure Your AWS S3 Bucket With Cloudflare

How To Secure Your AWS S3 Bucket With Cloudflare

6
Comments
4 min read
Kubernetes Open Sourced their Security Audit. That's Awesome.

Kubernetes Open Sourced their Security Audit. That's Awesome.

14
Comments
4 min read
Securing secret key in Android using Keystore

Securing secret key in Android using Keystore

7
Comments
4 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

40
Comments 11
8 min read
Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

Authorization Series — Pt 2: Securing HTTP APIs with RBAC rules

3
Comments
1 min read
Learn the Django User Authentication System

Learn the Django User Authentication System

12
Comments
2 min read
Negotiating security requirements with clients

Negotiating security requirements with clients

5
Comments
2 min read
Five things I knew about security, before I knew anything about security

Five things I knew about security, before I knew anything about security

88
Comments 8
5 min read
6 Best Practices for Successful SIEM Implementation

6 Best Practices for Successful SIEM Implementation

12
Comments
5 min read
What Is Step-Up Authentication, and When Should You Use It?

What Is Step-Up Authentication, and When Should You Use It?

5
Comments
1 min read
Picking the FB50 smart lock (CVE-2019-13143)

Picking the FB50 smart lock (CVE-2019-13143)

10
Comments
4 min read
The Comprehensive Guide to WordPress Security in 2019

The Comprehensive Guide to WordPress Security in 2019

59
Comments 1
13 min read
Creating and Remembering a Strong Passphrase

Creating and Remembering a Strong Passphrase

3
Comments 1
3 min read
How Do I Hunt Down Social Media Accounts Using Sherlock?

How Do I Hunt Down Social Media Accounts Using Sherlock?

19
Comments 2
2 min read
Secure Docker : Enable Docker Content Trust

Secure Docker : Enable Docker Content Trust

10
Comments
2 min read
Deception Technology as a Strategy for Cyber Security

Deception Technology as a Strategy for Cyber Security

4
Comments
5 min read
They Who Control Encryption

They Who Control Encryption

18
Comments 5
2 min read
OverTheWire Bandit Level 2 Level 3 walk-through

OverTheWire Bandit Level 2 Level 3 walk-through

5
Comments
1 min read
Systemd security w/o User directive

Systemd security w/o User directive

4
Comments 1
1 min read
How to Improve Your Azure Security with the Secure DevOps Kit for Azure (AzSK)

How to Improve Your Azure Security with the Secure DevOps Kit for Azure (AzSK)

9
Comments
6 min read
Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

87
Comments 3
4 min read
Locking javascript to a domain: Part I

Locking javascript to a domain: Part I

34
Comments 8
3 min read
5 must-do security tips for developers

5 must-do security tips for developers

105
Comments 8
3 min read
Access Control

Access Control

37
Comments
6 min read
loading...