DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Detect the .bt WordPress Hack

How to Detect the .bt WordPress Hack

6
Comments
4 min read
#30DaysOfThreads - The Cyber Attack Lifecycle

#30DaysOfThreads - The Cyber Attack Lifecycle

6
Comments 2
2 min read
Create a Secure Azure Sphere App using the Grove Shield Sensor Kit

Create a Secure Azure Sphere App using the Grove Shield Sensor Kit

8
Comments
7 min read
SQL is Insecure

SQL is Insecure

6
Comments 31
2 min read
MQTT Security

MQTT Security

7
Comments
2 min read
Tips for container, DNS & database security

Tips for container, DNS & database security

37
Comments
2 min read
Scale Securely with Transit Gateway

Scale Securely with Transit Gateway

2
Comments
1 min read
10 Signs showing your WordPress Site is Hacked

10 Signs showing your WordPress Site is Hacked

4
Comments
7 min read
About error handling in Go; logging best practices; & ATO attacks

About error handling in Go; logging best practices; & ATO attacks

39
Comments
2 min read
Security Risks of 5G Networks

Security Risks of 5G Networks

5
Comments
5 min read
How does delegated credential works?

How does delegated credential works?

6
Comments
1 min read
Tips on avoiding intellectual property theft in outsourcing

Tips on avoiding intellectual property theft in outsourcing

4
Comments
4 min read
AWS protect SSRF vulnerabilities with new EC2 Instance Metadata feature

AWS protect SSRF vulnerabilities with new EC2 Instance Metadata feature

12
Comments
1 min read
Integrate static security checking for python!

Integrate static security checking for python!

7
Comments
2 min read
Reverse Shell Generation.

Reverse Shell Generation.

3
Comments
1 min read
Top Tricks Hackers do to infect your system on Social Internet

Top Tricks Hackers do to infect your system on Social Internet

6
Comments
1 min read
Create a Content Security Policy (CSP) in Hugo

Create a Content Security Policy (CSP) in Hugo

12
Comments
5 min read
Preventing Homoglyph attacks with OCR.

Preventing Homoglyph attacks with OCR.

17
Comments
4 min read
Top 5 Best Practices for Angular App Security

Top 5 Best Practices for Angular App Security

13
Comments
5 min read
Serverless Security with Unikernels

Serverless Security with Unikernels

9
Comments
12 min read
Third party

Third party

6
Comments
4 min read
Distributed Rant Series Part 2

Distributed Rant Series Part 2

6
Comments
6 min read
Distributed Rant Series Part 1

Distributed Rant Series Part 1

4
Comments 1
2 min read
How to minimize security concerns in your applications

How to minimize security concerns in your applications

35
Comments 5
2 min read
How to deal with outsourcing fraud

How to deal with outsourcing fraud

6
Comments
4 min read
Firewalls on Linux

Firewalls on Linux

9
Comments
2 min read
Silent push for the web

Silent push for the web

5
Comments
3 min read
Lead SDET Opportunity - Banyan Security (San Francisco)

Lead SDET Opportunity - Banyan Security (San Francisco)

3
Comments
1 min read
The API Gateway security risk you need to pay attention to

The API Gateway security risk you need to pay attention to

8
Comments 2
4 min read
Lock Your Door and Close Your Windows

Lock Your Door and Close Your Windows

8
Comments
4 min read
We've made a privacy-focused analytics platform

We've made a privacy-focused analytics platform

9
Comments 2
1 min read
NordVPN: Official response regarding the breach of one of our datacenters

NordVPN: Official response regarding the breach of one of our datacenters

4
Comments
1 min read
Go-ofile

Go-ofile

7
Comments
1 min read
Authenticate The Future: 3 Ways To Make Your Application More Secure

Authenticate The Future: 3 Ways To Make Your Application More Secure

6
Comments
4 min read
How to setup DNS over HTTPS (Doh 🍩!) in Google Chrome on MacOSX

How to setup DNS over HTTPS (Doh 🍩!) in Google Chrome on MacOSX

18
Comments
3 min read
Azure AD Application Registration Security with Graph API

Azure AD Application Registration Security with Graph API

5
Comments
6 min read
Kubernetes myths; app security 101; & change management in teams

Kubernetes myths; app security 101; & change management in teams

34
Comments
2 min read
Modern cyber security tooling should empower developers

Modern cyber security tooling should empower developers

12
Comments
3 min read
Prove you are not human - use ACME

Prove you are not human - use ACME

8
Comments
3 min read
Implementing Security for Your Business

Implementing Security for Your Business

7
Comments
3 min read
Security, meet Agile; Reviewing code you dislike; and Web Performance KPIs

Security, meet Agile; Reviewing code you dislike; and Web Performance KPIs

15
Comments
2 min read
Securing IIS

Securing IIS

8
Comments
2 min read
Upgrading APIs, Cloud security & some Engineering advice

Upgrading APIs, Cloud security & some Engineering advice

8
Comments
2 min read
Python Encryption with Trezor

Python Encryption with Trezor

5
Comments
3 min read
Trezor hardware wallet with Python

Trezor hardware wallet with Python

8
Comments
2 min read
How users and applications stay safe on the Internet: it's proxy servers all the way down

How users and applications stay safe on the Internet: it's proxy servers all the way down

91
Comments 1
9 min read
How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

6
Comments
4 min read
Why are you not using HTTPS?

Why are you not using HTTPS?

11
Comments
1 min read
Bots are Playing a Bigger Role in the Election than People Realize

Bots are Playing a Bigger Role in the Election than People Realize

6
Comments
23 min read
Compromising User Data via Push Notification Services

Compromising User Data via Push Notification Services

6
Comments
3 min read
Hack Rails with vulnerabilities by OWASP

Hack Rails with vulnerabilities by OWASP

5
Comments
1 min read
“Why would anyone hack me? I’m just a small business owner!”

“Why would anyone hack me? I’m just a small business owner!”

7
Comments
1 min read
My story of setting up Let’s Encrypt SSL on SiteGround

My story of setting up Let’s Encrypt SSL on SiteGround

6
Comments 1
1 min read
Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

8
Comments 3
1 min read
You have critical security vulnerabilities in your software but you don’t know it yet!

You have critical security vulnerabilities in your software but you don’t know it yet!

5
Comments
13 min read
Presentations I would love to watch

Presentations I would love to watch

6
Comments
2 min read
Weekly Links #3

Weekly Links #3

8
Comments
3 min read
How to Securely Backup a Seed Phrase

How to Securely Backup a Seed Phrase

5
Comments
3 min read
Why you should use uBlock Origin just like me?

Why you should use uBlock Origin just like me?

4
Comments
1 min read
The target="_blank" vulnerability by example

The target="_blank" vulnerability by example

42
Comments 15
3 min read
loading...