DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Explain OAuth2 like I'm five

Explain OAuth2 like I'm five

23
Comments 2
1 min read
Rethinking email confirmation

Rethinking email confirmation

18
Comments 4
4 min read
How I pwned hundreds of users for less than $25?

How I pwned hundreds of users for less than $25?

4
Comments
1 min read
Attacking CI/CD Tools The Crown Jewels — Series 2

Attacking CI/CD Tools The Crown Jewels — Series 2

3
Comments
1 min read
Attacking CI/CD Tools The Crown Jewels — Series 1

Attacking CI/CD Tools The Crown Jewels — Series 1

3
Comments
1 min read
OAuth for Dummies

OAuth for Dummies

73
Comments 4
2 min read
Licensed Revoked; Certificate Status Checking in PKIX

Licensed Revoked; Certificate Status Checking in PKIX

21
Comments
4 min read
SDK for Private & Ethical Access to Personal Data

SDK for Private & Ethical Access to Personal Data

3
Comments
1 min read
What is a WAF?

What is a WAF?

18
Comments 1
2 min read
Spot False Positives in Static Scans: Insecure Randomness

Spot False Positives in Static Scans: Insecure Randomness

6
Comments
4 min read
7 Cloud Computing Security Vulnerabilities and What to Do About Them

7 Cloud Computing Security Vulnerabilities and What to Do About Them

13
Comments
10 min read
What is Encryption?

What is Encryption?

22
Comments 7
5 min read
7 Top Benefits of Outsourcing Security Services

7 Top Benefits of Outsourcing Security Services

11
Comments
6 min read
A Helpful Resource on Securely Connecting Google Analytics to Gatsby

A Helpful Resource on Securely Connecting Google Analytics to Gatsby

2
Comments
1 min read
Forging JSON Web Tokens To Win a Prize

Forging JSON Web Tokens To Win a Prize

13
Comments 2
5 min read
Running a Kali VM on a retina display with zero lag

Running a Kali VM on a retina display with zero lag

4
Comments
2 min read
5 Non-Technical Ways to Protect Your WordPress Website from Hackers

5 Non-Technical Ways to Protect Your WordPress Website from Hackers

4
Comments 2
2 min read
Gitcoin + Matic: A Staking Partnership

Gitcoin + Matic: A Staking Partnership

3
Comments
3 min read
Did You Know There Are Different Types of Certs for HTTPS?

Did You Know There Are Different Types of Certs for HTTPS?

25
Comments 9
2 min read
How to scan local files for secrets in python using the GitGuardian API

How to scan local files for secrets in python using the GitGuardian API

6
Comments
9 min read
Mobile App Security Vulnerabilities and How to Mitigate Them

Mobile App Security Vulnerabilities and How to Mitigate Them

2
Comments
1 min read
Social Authentication or Not?

Social Authentication or Not?

2
Comments 4
1 min read
OWASP Top 10 Mobile Vulnerabilities Developers Need to Understand

OWASP Top 10 Mobile Vulnerabilities Developers Need to Understand

10
Comments
6 min read
Clickjacking attack Protection

Clickjacking attack Protection

6
Comments
2 min read
Tsurugi Linux - Device Unlocker Code Review

Tsurugi Linux - Device Unlocker Code Review

2
Comments
1 min read
How good is your SSL?

How good is your SSL?

5
Comments
2 min read
JavaScript Security Pitfalls

JavaScript Security Pitfalls

13
Comments 2
2 min read
DevSecOps – the key to avoid security breaches

DevSecOps – the key to avoid security breaches

3
Comments
5 min read
Two tests you should run against your Ruby project now

Two tests you should run against your Ruby project now

11
Comments
3 min read
Days 1 and 2 - Auth

Days 1 and 2 - Auth

2
Comments
1 min read
Hardening Server Security By Implementing Security Headers

Hardening Server Security By Implementing Security Headers

11
Comments
2 min read
OverTheWire :- Bandit (Level 15–20) [CTF]

OverTheWire :- Bandit (Level 15–20) [CTF]

5
Comments
4 min read
OverTheWire :- Bandit (Level 10–15) [CTF]

OverTheWire :- Bandit (Level 10–15) [CTF]

5
Comments 2
4 min read
Privacy level up!

Privacy level up!

14
Comments 2
2 min read
Brief(ish) explanation of how https works

Brief(ish) explanation of how https works

170
Comments 18
7 min read
Server Security For Beginners Pt. 1

Server Security For Beginners Pt. 1

11
Comments
1 min read
I fell for fraud

I fell for fraud

2
Comments 1
4 min read
How to Protect Your Data from Unauthorized Access

How to Protect Your Data from Unauthorized Access

9
Comments
9 min read
Secure your cookies to the next level with SameSite attribute

Secure your cookies to the next level with SameSite attribute

18
Comments
4 min read
You'd Probably Willingly Tell This Woman Your Password

You'd Probably Willingly Tell This Woman Your Password

20
Comments 25
8 min read
The 'forgotten' ZEE5 data leak you didn't hear about.

The 'forgotten' ZEE5 data leak you didn't hear about.

2
Comments
4 min read
Hacking Open Source Software for Fun and Non-Profit

Hacking Open Source Software for Fun and Non-Profit

13
Comments
6 min read
Announcing GraphQL Application Security Testing

Announcing GraphQL Application Security Testing

7
Comments
2 min read
ScanPC, your new (open source) tool for Windows compliance audits

ScanPC, your new (open source) tool for Windows compliance audits

2
Comments
2 min read
Auditing Techniques and Security Of Linux Server

Auditing Techniques and Security Of Linux Server

7
Comments
1 min read
How to Improve Your DevOps Test Automation Strategy

How to Improve Your DevOps Test Automation Strategy

36
Comments
7 min read
2 Factor Authentication Using an External Drive

2 Factor Authentication Using an External Drive

5
Comments
4 min read
Controlling Access to Your Microservices with Istio Service Mesh

Controlling Access to Your Microservices with Istio Service Mesh

2
Comments
1 min read
What is secret sprawl, why it’s dangerous, and how developers can prevent it?

What is secret sprawl, why it’s dangerous, and how developers can prevent it?

2
Comments
5 min read
Libsodium Quick Reference

Libsodium Quick Reference

10
Comments 1
11 min read
User creation and first access

User creation and first access

1
Comments
1 min read
Detecting, Reporting and Mitigating System Vulnerabilities for Go

Detecting, Reporting and Mitigating System Vulnerabilities for Go

4
Comments
5 min read
All about aria-current attribute

All about aria-current attribute

14
Comments
2 min read
What are the Differences Between DevOps and Agile? (Infographic)

What are the Differences Between DevOps and Agile? (Infographic)

3
Comments 1
1 min read
Learning the CTF way! : 1/n

Learning the CTF way! : 1/n

10
Comments 2
2 min read
What Not to Log When Remotely Debugging Mobile Apps

What Not to Log When Remotely Debugging Mobile Apps

7
Comments
7 min read
API Security for the Data Layer

API Security for the Data Layer

7
Comments
3 min read
Baby's First Hash Encryption

Baby's First Hash Encryption

4
Comments
5 min read
10 Rules for Protecting your Computer from Malware

10 Rules for Protecting your Computer from Malware

4
Comments
4 min read
Defense Against the Dark Arts: CSRF Attacks

Defense Against the Dark Arts: CSRF Attacks

60
Comments 14
1 min read
loading...