DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
DevOps Prerequisite (Part 9): SSL and TLS

DevOps Prerequisite (Part 9): SSL and TLS

Comments
5 min read
Good Security Boosts Your Flow

Good Security Boosts Your Flow

Comments
7 min read
Pulsar preventing vulnerabilities #1 — polkit (CVE-2021–4034)

Pulsar preventing vulnerabilities #1 — polkit (CVE-2021–4034)

Comments
4 min read
Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Comments
7 min read
Issue 61 of AWS Cloud Security Weekly

Issue 61 of AWS Cloud Security Weekly

1
Comments
2 min read
Securing and enhancing LLM prompts & outputs: A guide using Amazon Bedrock Guardrails and open-source solutions

Securing and enhancing LLM prompts & outputs: A guide using Amazon Bedrock Guardrails and open-source solutions

14
Comments 1
14 min read
Issue 64 of AWS Cloud Security Weekly

Issue 64 of AWS Cloud Security Weekly

3
Comments
3 min read
How to Use Nmap & Zenmap for Network Security Scanning

How to Use Nmap & Zenmap for Network Security Scanning

4
Comments
4 min read
Secure Your Website: Best Practices for AWS Deployment

Secure Your Website: Best Practices for AWS Deployment

1
Comments
4 min read
Insights on Securing Your Kubernetes Cluster with Falco 🚀🔒

Insights on Securing Your Kubernetes Cluster with Falco 🚀🔒

Comments
5 min read
Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Comments
15 min read
Secure Your Data with Entity Framework Core Encryption

Secure Your Data with Entity Framework Core Encryption

3
Comments 1
5 min read
Red Teaming for Responsible AI

Red Teaming for Responsible AI

4
Comments
4 min read
Proxmox Network Storage: Firewall Rules

Proxmox Network Storage: Firewall Rules

2
Comments
3 min read
Pentesting AWS Cognito: User Authentication Risks

Pentesting AWS Cognito: User Authentication Risks

Comments
12 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Protecting your Fintech App Customers further with Panic Password

Protecting your Fintech App Customers further with Panic Password

3
Comments
3 min read
How to disable root ssh login in Linux

How to disable root ssh login in Linux

Comments
1 min read
Handling JWT Authentications Securely: Pitfalls and Best Practices

Handling JWT Authentications Securely: Pitfalls and Best Practices

5
Comments
3 min read
The backbone of the internet: understanding protocol

The backbone of the internet: understanding protocol

Comments
4 min read
AWS: IAM Access Analyzer policy generation — create an IAM Policy

AWS: IAM Access Analyzer policy generation — create an IAM Policy

Comments
6 min read
AWS Security Group Rules

AWS Security Group Rules

Comments
2 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

11
Comments
3 min read
LINUX Systems Under Attack via Printing System (CUPS)

LINUX Systems Under Attack via Printing System (CUPS)

4
Comments
5 min read
Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Comments
3 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

3
Comments
2 min read
Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
This Month in Minder: September 2024

This Month in Minder: September 2024

3
Comments
1 min read
Easy way to geo-fence your cloud VPS with nftables

Easy way to geo-fence your cloud VPS with nftables

Comments 1
5 min read
AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

1
Comments 1
1 min read
Why should you upgrade your PostgreSQL today?

Why should you upgrade your PostgreSQL today?

1
Comments 1
3 min read
Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

1
Comments 1
4 min read
3G Cell Service Has a HUGE Security Flaw.

3G Cell Service Has a HUGE Security Flaw.

21
Comments 9
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

12
Comments
1 min read
Building a Password Manager in Go: Part 2

Building a Password Manager in Go: Part 2

10
Comments 1
3 min read
Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

1
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
From legacy to cloud serverless - Part 4

From legacy to cloud serverless - Part 4

Comments
7 min read
Enhance DigitalOcean with AWS-Level SSM and SSO Features

Enhance DigitalOcean with AWS-Level SSM and SSO Features

Comments
4 min read
Network Automization using AI.

Network Automization using AI.

Comments
6 min read
HIPAA Compliance Checklist For Healthcare Startups

HIPAA Compliance Checklist For Healthcare Startups

Comments
7 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
How to publish custom cdk-nag rules and rule packs with Projen

How to publish custom cdk-nag rules and rule packs with Projen

6
Comments
6 min read
Malware: Detection, Collection, and Analysis

Malware: Detection, Collection, and Analysis

2
Comments 2
3 min read
Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

1
Comments
3 min read
Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

5
Comments
6 min read
Proxmox and NAS: Implementing VLANs for Network Isolation

Proxmox and NAS: Implementing VLANs for Network Isolation

Comments
4 min read
Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

1
Comments
3 min read
Is Authentication Just About What The Server And Client Know And Don't Know?

Is Authentication Just About What The Server And Client Know And Don't Know?

Comments
2 min read
Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

3
Comments
16 min read
Introduction to SSH setup

Introduction to SSH setup

Comments
4 min read
JWT at a Glance

JWT at a Glance

Comments
13 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

4
Comments
4 min read
Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

5
Comments 1
2 min read
Proteção em dispositivos móveis.

Proteção em dispositivos móveis.

Comments
2 min read
Data Validation Techniques

Data Validation Techniques

25
Comments
1 min read
loading...