DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

6
Comments 1
8 min read
Beware of browser extensions that track you everywhere

Beware of browser extensions that track you everywhere

109
Comments 15
1 min read
Testing A WordPress Plugin Can Be Fun!

Testing A WordPress Plugin Can Be Fun!

10
Comments 2
9 min read
Java - JVM Security Information Gathering

Java - JVM Security Information Gathering

10
Comments
2 min read
AWS S3 or the Pandora's box

AWS S3 or the Pandora's box

11
Comments
1 min read
How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

18
Comments 7
2 min read
AWS and Messy Git Practices: SecDSM March MiniCTF Solution

AWS and Messy Git Practices: SecDSM March MiniCTF Solution

34
Comments 2
5 min read
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby’s native resolver.

Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby’s native resolver.

13
Comments
7 min read
Operation FGTNY 🗽 - Solving the H1-212 CTF.

Operation FGTNY 🗽 - Solving the H1-212 CTF.

11
Comments
11 min read
Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

12
Comments
4 min read
An analysis of logic flaws in web-of-trust services

An analysis of logic flaws in web-of-trust services

16
Comments
5 min read
Protect your Node.js app from Cross-Site Request Forgery

Protect your Node.js app from Cross-Site Request Forgery

160
Comments
6 min read
GitHub for Bug Bounty Hunters

GitHub for Bug Bounty Hunters

15
Comments
4 min read
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

12
Comments
3 min read
A House of Cards: An Exploration of Security When Building Docker Containers

A House of Cards: An Exploration of Security When Building Docker Containers

31
Comments 2
10 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

13
Comments
2 min read
Find security issues before the code goes into production

Find security issues before the code goes into production

20
Comments 1
7 min read
Beyond the login screen - Part II

Beyond the login screen - Part II

14
Comments
5 min read
Visualize AWS Flow Logs in a Visual Environment (closed beta)

Visualize AWS Flow Logs in a Visual Environment (closed beta)

7
Comments
1 min read
Beyond the login screen - Part I

Beyond the login screen - Part I

17
Comments 2
2 min read
Homographs, Attack!

Homographs, Attack!

316
Comments 30
10 min read
Using HTTP Headers to Secure Your Site

Using HTTP Headers to Secure Your Site

225
Comments
9 min read
Four Security Principles That Software Developers Should Follow

Four Security Principles That Software Developers Should Follow

211
Comments 21
8 min read
Please Stop Using Local Storage

Please Stop Using Local Storage

1101
Comments 203
11 min read
Security Sprint: What I learnt in a CTF

Security Sprint: What I learnt in a CTF

56
Comments 5
2 min read
Adding Free SSL Certificates To Static Websites via AWS Certificate Manager

Adding Free SSL Certificates To Static Websites via AWS Certificate Manager

29
Comments
4 min read
Linux Syslog Server And Log Management

Linux Syslog Server And Log Management

13
Comments
1 min read
[PoC] Password-Based user roles and triggers/actions

[PoC] Password-Based user roles and triggers/actions

9
Comments
4 min read
I learned enough Web Crypto to be dangerous

I learned enough Web Crypto to be dangerous

17
Comments 6
4 min read
Add security.txt to your website

Add security.txt to your website

12
Comments
2 min read
Dark patterns with the HTML 5.2 <dialog> tag and Chrome for fun and profit

Dark patterns with the HTML 5.2 <dialog> tag and Chrome for fun and profit

13
Comments 1
1 min read
How screwed would your employer be if you died suddenly?

How screwed would your employer be if you died suddenly?

22
Comments 16
5 min read
This is how Meltdown works

This is how Meltdown works

215
Comments 26
5 min read
The Case for Automatic Updates

The Case for Automatic Updates

11
Comments 1
5 min read
Preparing for the EU General Data Protection Regulation with 12 steps

Preparing for the EU General Data Protection Regulation with 12 steps

15
Comments
3 min read
Things I think I know about Cryptography

Things I think I know about Cryptography

18
Comments 1
5 min read
Build Your Own Invoicing Service with Node, Coinbase, Bitcoin, and Okta

Build Your Own Invoicing Service with Node, Coinbase, Bitcoin, and Okta

34
Comments 4
17 min read
Processor Security Flaws

Processor Security Flaws

38
Comments 9
1 min read
How to put Google Invisible reCaptcha on your website

How to put Google Invisible reCaptcha on your website

11
Comments
1 min read
Bulletproof Node — Security Best Practises

Bulletproof Node — Security Best Practises

17
Comments
5 min read
Open Source API Gateways?

Open Source API Gateways?

29
Comments 27
1 min read
Crypto Show And Tell: The Wonders of Diffie-Hellman-Merkle

Crypto Show And Tell: The Wonders of Diffie-Hellman-Merkle

28
Comments 2
5 min read
Security Sprint week 9: Privacy politics and the internet

Security Sprint week 9: Privacy politics and the internet

13
Comments 3
2 min read
Security Sprint week 7&8: A chat with a security expert

Security Sprint week 7&8: A chat with a security expert

16
Comments
4 min read
Software security is hopelessly broken

Software security is hopelessly broken

29
Comments 8
8 min read
The Spectre of the Zygote

The Spectre of the Zygote

15
Comments
6 min read
Four Tips for a More Secure Website

Four Tips for a More Secure Website

49
Comments 6
7 min read
You Just Need to Speculate to Exfiltrate

You Just Need to Speculate to Exfiltrate

15
Comments
11 min read
My Journey From Getting Hacked to a Security Consultant (Ethical Hacking)

My Journey From Getting Hacked to a Security Consultant (Ethical Hacking)

47
Comments 7
4 min read
Useful Linux Security Tricks To Harden Your System

Useful Linux Security Tricks To Harden Your System

26
Comments
1 min read
Spectre & Meltdown: How does this affect mobile apps?

Spectre & Meltdown: How does this affect mobile apps?

15
Comments 3
1 min read
Client and Server API Protection

Client and Server API Protection

12
Comments 2
2 min read
DNS Gazer: Passive DNS query/reply logging tool for security monitoring

DNS Gazer: Passive DNS query/reply logging tool for security monitoring

15
Comments
4 min read
Dear Internet, Stop Taking My Information Over HTTP

Dear Internet, Stop Taking My Information Over HTTP

19
Comments
3 min read
Mitigating cross-site scripting with Content Security Policy

Mitigating cross-site scripting with Content Security Policy

37
Comments 8
3 min read
Critique My Plan: API Key for Authentication

Critique My Plan: API Key for Authentication

37
Comments 14
4 min read
Security Sprint: week 6 - Perl, forensic and new limits

Security Sprint: week 6 - Perl, forensic and new limits

20
Comments 1
4 min read
Security Sprint: Week 5: Network capture probe

Security Sprint: Week 5: Network capture probe

9
Comments
2 min read
Security Sprint week 4: CA pairs creation with openssl

Security Sprint week 4: CA pairs creation with openssl

10
Comments 1
5 min read
Things you wanted to know about storing passwords but were afraid to ask

Things you wanted to know about storing passwords but were afraid to ask

30
Comments 13
10 min read
loading...