DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

5
Comments
13 min read
0-day Vulnerability for Social Warfare WordPress plugin

0-day Vulnerability for Social Warfare WordPress plugin

4
Comments
2 min read
WooCommerce Checkout Manager 4.2.6 Vulnerability

WooCommerce Checkout Manager 4.2.6 Vulnerability

3
Comments
1 min read
Secrets Management in Elixir Using AWS

Secrets Management in Elixir Using AWS

19
Comments
3 min read
SAST Tooling – Part 2: The selection criteria

SAST Tooling – Part 2: The selection criteria

5
Comments
3 min read
Securing APIs and Microservices with OAuth and OpenID Connect

Securing APIs and Microservices with OAuth and OpenID Connect

9
Comments
1 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

14
Comments
6 min read
Chatbot Security Framework: Everything you need to know about Chatbot security

Chatbot Security Framework: Everything you need to know about Chatbot security

4
Comments
7 min read
Technology landscape for Identification Management System

Technology landscape for Identification Management System

9
Comments
4 min read
How to protect your Node.js applications from malicious dependencies

How to protect your Node.js applications from malicious dependencies

6
Comments
5 min read
The latest npm breach…or is it?

The latest npm breach…or is it?

4
Comments
8 min read
Eight moderator factors of security and performance verification

Eight moderator factors of security and performance verification

8
Comments 1
1 min read
SAST Tooling – Part 3: The Winner

SAST Tooling – Part 3: The Winner

5
Comments
4 min read
SQL Injection??

SQL Injection??

6
Comments 1
1 min read
Flutter at IO Extended Kuala Lumpur 2019 — Follow-up

Flutter at IO Extended Kuala Lumpur 2019 — Follow-up

3
Comments
13 min read
Happy DAY - My Github Project listed in BlackArch OS

Happy DAY - My Github Project listed in BlackArch OS

11
Comments 2
1 min read
Five Hard Earned Tips For Increasing Your Wordpress Security

Five Hard Earned Tips For Increasing Your Wordpress Security

8
Comments
6 min read
Creating a covert channel over the Telegram

Creating a covert channel over the Telegram

11
Comments
7 min read
PWGen - Create strong passwords easy to remember but hard to break

PWGen - Create strong passwords easy to remember but hard to break

6
Comments
2 min read
How to Protect React Native Apps with Jscrambler

How to Protect React Native Apps with Jscrambler

6
Comments
5 min read
How to send file securely on the blockchain [The easy way]

How to send file securely on the blockchain [The easy way]

15
Comments
2 min read
Hackitect series vol.1 - Hackitect journey as the mission

Hackitect series vol.1 - Hackitect journey as the mission

10
Comments
5 min read
How to do Security Updates only with Yum in CentOS

How to do Security Updates only with Yum in CentOS

7
Comments 1
1 min read
Global AppSec 2019 - Tel Aviv

Global AppSec 2019 - Tel Aviv

5
Comments
6 min read
5 cosas que aprendĂ­ en KubeCon Barcelona

5 cosas que aprendĂ­ en KubeCon Barcelona

10
Comments 2
4 min read
Why should Drupal be your first choice of open source CMS?

Why should Drupal be your first choice of open source CMS?

4
Comments
1 min read
Are Passwords A Thing Of The Past?

Are Passwords A Thing Of The Past?

4
Comments
2 min read
Establishing Trust: Why TLS should be important to you

Establishing Trust: Why TLS should be important to you

5
Comments
5 min read
3 Metrics Relevant to Every Service, Always

3 Metrics Relevant to Every Service, Always

5
Comments
5 min read
Securing a Webapp - Step 0: An Introduction

Securing a Webapp - Step 0: An Introduction

50
Comments 4
2 min read
Testing python security

Testing python security

8
Comments
1 min read
Security leader interview: Adam Surak on approaching security at Algolia

Security leader interview: Adam Surak on approaching security at Algolia

3
Comments
7 min read
The secret sauce of software licenses: it may be bitter.

The secret sauce of software licenses: it may be bitter.

4
Comments
4 min read
MPC Part 1: Oblivious Transfer

MPC Part 1: Oblivious Transfer

8
Comments 3
8 min read
Can a VPN be hacked?

Can a VPN be hacked?

3
Comments 1
1 min read
100% Anonymous VPN: Does it really exist?

100% Anonymous VPN: Does it really exist?

5
Comments
1 min read
Git, GitHub and how to keep your secrets... secret!

Git, GitHub and how to keep your secrets... secret!

6
Comments
1 min read
Clients and Servers

Clients and Servers

5
Comments 1
2 min read
feedback for speedle open source project

feedback for speedle open source project

10
Comments 1
1 min read
Passphrases and Key Files

Passphrases and Key Files

7
Comments 1
1 min read
GitHub - realtho/PartyLoud

GitHub - realtho/PartyLoud

4
Comments 3
1 min read
Facebook direct links for Firefox is back!

Facebook direct links for Firefox is back!

4
Comments 1
1 min read
Unsafe SQL functions in Laravel

Unsafe SQL functions in Laravel

7
Comments 1
1 min read
How To Make Your Mobile App Trustworthy: Six Aspects To Consider

How To Make Your Mobile App Trustworthy: Six Aspects To Consider

7
Comments 3
5 min read
Make people trust your NuGet Packages more with code signing!

Make people trust your NuGet Packages more with code signing!

9
Comments
8 min read
Lessons learned from jerks on the Internet

Lessons learned from jerks on the Internet

6
Comments 1
1 min read
Configure Azure AD Privileged Identity Management

Configure Azure AD Privileged Identity Management

5
Comments
2 min read
Implement Secure data solutions

Implement Secure data solutions

5
Comments
2 min read
Attacking phone through BT headset

Attacking phone through BT headset

10
Comments 3
1 min read
California's new privacy law explained

California's new privacy law explained

5
Comments
1 min read
Does it matter how the cryptographic keys stored?

Does it matter how the cryptographic keys stored?

5
Comments 1
1 min read
Building for the bad guys

Building for the bad guys

8
Comments
3 min read
Today’s rails security update in plain english

Today’s rails security update in plain english

34
Comments 6
2 min read
Why did we build ApproveAPI?

Why did we build ApproveAPI?

7
Comments
2 min read
Great Scott! Timing Attack Demo for the Everyday Webdev

Great Scott! Timing Attack Demo for the Everyday Webdev

7
Comments
10 min read
The Real Facts About VPNs

The Real Facts About VPNs

11
Comments 3
2 min read
Customer Security Questionnaires: The VRA Two-Step

Customer Security Questionnaires: The VRA Two-Step

3
Comments
10 min read
Is it safe to host many droplets in one digital ocean account?

Is it safe to host many droplets in one digital ocean account?

5
Comments 2
1 min read
Scraping Slack Webhooks from GitHub

Scraping Slack Webhooks from GitHub

12
Comments
6 min read
10 best practices to protect your users’ data (and why they’re still not sufficient)

10 best practices to protect your users’ data (and why they’re still not sufficient)

57
Comments 7
5 min read
loading...