DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Easy Single Sign-On with Spring Boot and OAuth 2.0

Easy Single Sign-On with Spring Boot and OAuth 2.0

15
Comments
10 min read
Secure your apps with Angular Directive when using target='_blank'

Secure your apps with Angular Directive when using target='_blank'

13
Comments 4
2 min read
Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

6
Comments
18 min read
Is the OAuth 2.0 Implicit Flow Dead?

Is the OAuth 2.0 Implicit Flow Dead?

11
Comments
12 min read
How to improve the security of your Netlify site?

How to improve the security of your Netlify site?

15
Comments 2
2 min read
Introduction to Linux Hardening

Introduction to Linux Hardening

192
Comments 10
3 min read
Spawn a Jenkins from code

Spawn a Jenkins from code

6
Comments 1
7 min read
Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

45
Comments 9
10 min read
Building Rootless Applications and Services

Building Rootless Applications and Services

7
Comments 1
6 min read
If Gmail says "Our system has detected that this message does not meet IPv6 sending guidelines regarding PTR records"

If Gmail says "Our system has detected that this message does not meet IPv6 sending guidelines regarding PTR records"

2
Comments
1 min read
Tutorial: Build Universal Applications with Nuxt.js

Tutorial: Build Universal Applications with Nuxt.js

12
Comments
15 min read
“CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter

“CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter

7
Comments
9 min read
What is Helm-Vault?

What is Helm-Vault?

8
Comments 1
2 min read
Detecting Suspicious Nextcloud Logins

Detecting Suspicious Nextcloud Logins

7
Comments 1
6 min read
Recommended way to securely connect to a GraphQL endpoint from a frontend application

Recommended way to securely connect to a GraphQL endpoint from a frontend application

4
Comments 1
1 min read
How to securely build Docker images for Node.js

How to securely build Docker images for Node.js

48
Comments 8
2 min read
User Account Linking in Alexa with ASP.NET Web API

User Account Linking in Alexa with ASP.NET Web API

8
Comments
14 min read
Scan Your Network for Vulnerabilities With Nmap

Scan Your Network for Vulnerabilities With Nmap

223
Comments 8
6 min read
Pushing Left, Like a Boss: Part 4: Secure Coding

Pushing Left, Like a Boss: Part 4: Secure Coding

10
Comments
1 min read
Secure applications

Secure applications

5
Comments 1
2 min read
Implement security for application lifecycle

Implement security for application lifecycle

7
Comments 1
1 min read
Simple Tool for Testing CVE Mitigation in Web Apps

Simple Tool for Testing CVE Mitigation in Web Apps

9
Comments 1
4 min read
Why PluginVulnerabilities(.com) is harming the WordPress eco-system!

Why PluginVulnerabilities(.com) is harming the WordPress eco-system!

11
Comments 3
3 min read
Understand application security

Understand application security

5
Comments 1
2 min read
The Fast Track to Serverless Security on AWS 22:25

The Fast Track to Serverless Security on AWS

23
Comments 1
1 min read
Configure encryption for data at rest

Configure encryption for data at rest

7
Comments 1
2 min read
Non-atomic increments in NodeJS or how I found a vulnerability in express-brute package.

Non-atomic increments in NodeJS or how I found a vulnerability in express-brute package.

10
Comments 4
4 min read
Configure security for data infrastructure

Configure security for data infrastructure

5
Comments 1
4 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

29
Comments 4
4 min read
Authy: step by step Multi-Factor Authentication configuration for Github and AWS

Authy: step by step Multi-Factor Authentication configuration for Github and AWS

7
Comments 3
5 min read
Pushing Left, Like a Boss! -- Part 3: Secure Design

Pushing Left, Like a Boss! -- Part 3: Secure Design

15
Comments 1
1 min read
How to fully leverage your pentest

How to fully leverage your pentest

9
Comments 1
11 min read
Configure security policies to manage data

Configure security policies to manage data

5
Comments 1
1 min read
Jenkins: a job to check a Github organization’s public repositories list

Jenkins: a job to check a Github organization’s public repositories list

6
Comments 2
3 min read
How to improve your npm identity security with 2FA and Tokens

How to improve your npm identity security with 2FA and Tokens

13
Comments 4
2 min read
JWT in dotnet core

JWT in dotnet core

11
Comments 1
2 min read
Create security baselines

Create security baselines

6
Comments 1
2 min read
Upgrading Spring Security OAuth and JUnit Tests through the 👀 of a Java Hipster

Upgrading Spring Security OAuth and JUnit Tests through the 👀 of a Java Hipster

6
Comments
15 min read
Manage security alerts

Manage security alerts

5
Comments 2
1 min read
Respond to and remediate security issues

Respond to and remediate security issues

4
Comments
1 min read
Configure security policies by using Azure Security Center

Configure security policies by using Azure Security Center

6
Comments 2
2 min read
Protect Yourself from Social Engineering

Protect Yourself from Social Engineering

233
Comments 20
6 min read
Azure Secure DevOps Kit 31:57

Azure Secure DevOps Kit

6
Comments 1
1 min read
Configure security services

Configure security services

4
Comments 1
1 min read
k8h3d Trojan/Botnet Explained & How It Disrupts the Entire Network - Check Your Computers NOW!

k8h3d Trojan/Botnet Explained & How It Disrupts the Entire Network - Check Your Computers NOW!

7
Comments 2
5 min read
Did you hear about the malicious backdoor discovered in the popular bootstrap-sass Ruby gem?

Did you hear about the malicious backdoor discovered in the popular bootstrap-sass Ruby gem?

39
Comments 1
1 min read
Sudo like you want to

Sudo like you want to

14
Comments 1
5 min read
My migration from keepassxc to pass (password store)

My migration from keepassxc to pass (password store)

15
Comments 2
7 min read
Implement subscription security

Implement subscription security

5
Comments 1
1 min read
Implement platform security

Implement platform security

8
Comments
2 min read
SELinux Has a UI Problem

SELinux Has a UI Problem

20
Comments 8
5 min read
Build a REST API with ASP.NET Core 2.2

Build a REST API with ASP.NET Core 2.2

7
Comments
12 min read
Top ten most popular docker images each contain at least 30 vulnerabilities

Top ten most popular docker images each contain at least 30 vulnerabilities

42
Comments 7
2 min read
How to Protect Your Server From Hackers

How to Protect Your Server From Hackers

396
Comments 18
3 min read
Implement host security

Implement host security

8
Comments
2 min read
Don't use "sudo" with NPM "install"

Don't use "sudo" with NPM "install"

8
Comments 1
1 min read
Secure the network

Secure the network

4
Comments
3 min read
How to Securely Deploy to Kubernetes from Bitbucket Pipelines

How to Securely Deploy to Kubernetes from Bitbucket Pipelines

10
Comments
3 min read
Implement network security

Implement network security

4
Comments
3 min read
Understand cloud security

Understand cloud security

6
Comments
2 min read
loading...