DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
MySQL/MariaDB: like a Petya ransomware for MySQL and ‘root’@’%’ access

MySQL/MariaDB: like a Petya ransomware for MySQL and ‘root’@’%’ access

9
Comments 2
3 min read
An overview about hash functions: Theory and Security

An overview about hash functions: Theory and Security

6
Comments
6 min read
How to Find Subdomains on a Website (And Why You Should)

How to Find Subdomains on a Website (And Why You Should)

212
Comments 11
4 min read
Tip #5 - audit your project for vulnerabilities in your open source dependencies

Tip #5 - audit your project for vulnerabilities in your open source dependencies

9
Comments
2 min read
How does Tor really work?

How does Tor really work?

161
Comments 4
17 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

75
Comments 5
1 min read
AWS White Paper Walkthrough - Security Overview of AWS Lambda March 2019 30:44

AWS White Paper Walkthrough - Security Overview of AWS Lambda March 2019

16
Comments 2
1 min read
Security Headers to use on your webserver

Security Headers to use on your webserver

159
Comments 9
15 min read
Root-Me: ExploitMe – Basic Buffer Overflow

Root-Me: ExploitMe – Basic Buffer Overflow

16
Comments 1
3 min read
Why HTTPS Makes A Difference

Why HTTPS Makes A Difference

93
Comments 9
3 min read
The Fast Track to AWS Security - Feb 26 2019 34:20

The Fast Track to AWS Security - Feb 26 2019

20
Comments
1 min read
Protecting Your API Keys - Rails

Protecting Your API Keys - Rails

11
Comments 1
2 min read
Learning Python Networking

Learning Python Networking

11
Comments
1 min read
Do your tech demos share too much?

Do your tech demos share too much?

5
Comments 1
4 min read
ClamAV: Fixing freshclam's Hanging Up

ClamAV: Fixing freshclam's Hanging Up

5
Comments 1
2 min read
Mastering Python for Networking and Security

Mastering Python for Networking and Security

10
Comments
2 min read
Solving a CTF challenge

Solving a CTF challenge

20
Comments 1
3 min read
How to Hire a Cybersecurity Expert (Before It’s Too Late)

How to Hire a Cybersecurity Expert (Before It’s Too Late)

5
Comments 2
4 min read
Top 3 Development Trends in 2019

Top 3 Development Trends in 2019

61
Comments 2
3 min read
CIA: Confidentiality, Integrity and Availability

CIA: Confidentiality, Integrity and Availability

15
Comments 2
4 min read
Facebook stored hundreds of millions of passwords in plaintext

Facebook stored hundreds of millions of passwords in plaintext

66
Comments 29
1 min read
Levelling-up your SSH Private Key from RSA to ED25519 + Symmetric Password Protection

Levelling-up your SSH Private Key from RSA to ED25519 + Symmetric Password Protection

12
Comments
2 min read
This is why I use KeyCloak?

This is why I use KeyCloak?

4
Comments
2 min read
Securing environment variables with lastpass

Securing environment variables with lastpass

17
Comments 3
2 min read
Share a NAT-GW through TGW

Share a NAT-GW through TGW

1
Comments
3 min read
Firestore Database Structure and Security:

Firestore Database Structure and Security:

16
Comments
6 min read
Top 10 Tips to Secure SSH Your Server

Top 10 Tips to Secure SSH Your Server

76
Comments 4
4 min read
Azure Key Vault

Azure Key Vault

6
Comments
3 min read
Secure Your Mobile App - Episode Four (Secure User Auth)

Secure Your Mobile App - Episode Four (Secure User Auth)

6
Comments
5 min read
Secure Your Mobile App - Episode Three (Securing Data in Transit)

Secure Your Mobile App - Episode Three (Securing Data in Transit)

5
Comments
4 min read
Monit: email alerting on an SSH logins

Monit: email alerting on an SSH logins

18
Comments
3 min read
What is CTF and how to get started!

What is CTF and how to get started!

575
Comments 21
3 min read
Break the Ice — Hardware CTF

Break the Ice — Hardware CTF

16
Comments
7 min read
Privacy by design (Pragmatic Privacy for Programmers, Part 3)

Privacy by design (Pragmatic Privacy for Programmers, Part 3)

10
Comments 2
6 min read
Secure Your Mobile App - Episode Two (Securing Data at Rest)

Secure Your Mobile App - Episode Two (Securing Data at Rest)

8
Comments
5 min read
Logging Activity With Laravel and Pusher

Logging Activity With Laravel and Pusher

11
Comments
3 min read
Secure Your Mobile App - Episode One (Protecting the Code)

Secure Your Mobile App - Episode One (Protecting the Code)

4
Comments
9 min read
Securing Logic App Http triggers

Securing Logic App Http triggers

6
Comments
5 min read
A Quick Guide to OAuth 2.0 with Spring Security

A Quick Guide to OAuth 2.0 with Spring Security

20
Comments
12 min read
Security For Your Web Apps - And Why It's Important

Security For Your Web Apps - And Why It's Important

82
Comments 2
5 min read
Docker images and playing cards: a security illustration

Docker images and playing cards: a security illustration

11
Comments
2 min read
This Why You Should Start doing Code Reviews

This Why You Should Start doing Code Reviews

11
Comments 1
2 min read
Phones Are Scary

Phones Are Scary

5
Comments 3
4 min read
Authentication, Authorization, and OAuth

Authentication, Authorization, and OAuth

15
Comments
4 min read
Root Me: ELF-CrackPass with NSA's Ghidra

Root Me: ELF-CrackPass with NSA's Ghidra

17
Comments 6
7 min read
Nevertheless, Paula Coded

Nevertheless, Paula Coded

47
Comments 3
2 min read
The anatomy of a critical vulnerability

The anatomy of a critical vulnerability

13
Comments
4 min read
10 Awesome Security Tips for Python Enthusiasts

10 Awesome Security Tips for Python Enthusiasts

59
Comments
4 min read
Phishing my company. An infosec lesson for businesses

Phishing my company. An infosec lesson for businesses

7
Comments 1
5 min read
How to avoid leaking secrets to the npm registry

How to avoid leaking secrets to the npm registry

42
Comments
2 min read
Public Key Cryptography Simply Explained

Public Key Cryptography Simply Explained

64
Comments 1
17 min read
Time to upgrade RubyGems

Time to upgrade RubyGems

8
Comments 1
1 min read
Vulnerability Identified in Docker & RunC

Vulnerability Identified in Docker & RunC

11
Comments 9
1 min read
How do you measure security? Security Metrics

How do you measure security? Security Metrics

14
Comments 5
1 min read
How safe are your cat pics?

How safe are your cat pics?

20
Comments 1
4 min read
Mobile Health Care Apps and HIPAA Compliance

Mobile Health Care Apps and HIPAA Compliance

20
Comments 6
5 min read
Are login forms that ask for your username and password on two different pages more secure?

Are login forms that ask for your username and password on two different pages more secure?

10
Comments 15
1 min read
OpenVPN: SSL and hostname configuration

OpenVPN: SSL and hostname configuration

5
Comments
3 min read
Firebase Functions: React users need to stop storing sensitive API keys in .env files!

Firebase Functions: React users need to stop storing sensitive API keys in .env files!

49
Comments 9
5 min read
Ten Ways to Secure your Applications

Ten Ways to Secure your Applications

63
Comments 2
9 min read
loading...