DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Use Cross Account IAM Role

How to Use Cross Account IAM Role

7
Comments
2 min read
Check Windows Vulnerabilities Right Now with Vuls!

Check Windows Vulnerabilities Right Now with Vuls!

3
Comments 1
4 min read
🕵️ Active Directory Groups audit w. Neo4J

🕵️ Active Directory Groups audit w. Neo4J

1
Comments 1
2 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Server Name Indication (SNI)

Server Name Indication (SNI)

4
Comments
7 min read
Applying Content Security Policy in Symfony to Reduce XSS Risks

Applying Content Security Policy in Symfony to Reduce XSS Risks

4
Comments
9 min read
What's the problem with my API?

What's the problem with my API?

3
Comments
3 min read
Ensuring Secure User Sessions: A Guide to Logging Out Users Due to Inactivity in PHP

Ensuring Secure User Sessions: A Guide to Logging Out Users Due to Inactivity in PHP

1
Comments
2 min read
My CNCF LFX Mentorship Spring 2023 Project at Kubescape

My CNCF LFX Mentorship Spring 2023 Project at Kubescape

4
Comments
7 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

9
Comments
6 min read
Why should you use IMDSv2 and not IMDS on AWS EC2

Why should you use IMDSv2 and not IMDS on AWS EC2

6
Comments
2 min read
Symfony internals and security

Symfony internals and security

3
Comments
3 min read
What is TCP/IP ? Introduction TCP/IP Packet.

What is TCP/IP ? Introduction TCP/IP Packet.

1
Comments
3 min read
Securing Node.js Applications with the Built-in Crypto Module: A Guide for Developers with code.

Securing Node.js Applications with the Built-in Crypto Module: A Guide for Developers with code.

1
Comments
3 min read
Types of Privilege Escalation Attacks

Types of Privilege Escalation Attacks

Comments
3 min read
Understanding and Mitigating CRLF Injection

Understanding and Mitigating CRLF Injection

Comments
4 min read
Snowflake Roles and Access Control: What You Need to Know 101

Snowflake Roles and Access Control: What You Need to Know 101

5
Comments
18 min read
Securing your Flutter apps with Multi-Factor Authentication

Securing your Flutter apps with Multi-Factor Authentication

Comments
14 min read
Understanding and Preventing NULL Pointer Dereference

Understanding and Preventing NULL Pointer Dereference

2
Comments
6 min read
🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

10
Comments
4 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Solving a critical bug in the default Rails caching library

Solving a critical bug in the default Rails caching library

10
Comments 2
6 min read
Symfony 5: The ubiquitous of API Platform

Symfony 5: The ubiquitous of API Platform

3
Comments
2 min read
Multi-Factor Authentication in the Cloud

Multi-Factor Authentication in the Cloud

6
Comments 5
6 min read
Maximizing Magento 2 Security: Advanced Techniques for Experienced Developers

Maximizing Magento 2 Security: Advanced Techniques for Experienced Developers

2
Comments 1
7 min read
You need to learn docker... security!

You need to learn docker... security!

5
Comments
2 min read
Vulnerabilidade de Software Para Devs

Vulnerabilidade de Software Para Devs

35
Comments 1
4 min read
Blazing a Trail: Web App Development with Microsoft Blazor in 2023

Blazing a Trail: Web App Development with Microsoft Blazor in 2023

9
Comments 2
11 min read
Locking Down Your RESTful API: Essential Practices for Bulletproof Security

Locking Down Your RESTful API: Essential Practices for Bulletproof Security

1
Comments
3 min read
govulncheck

govulncheck

Comments
1 min read
PostgreSQL 14: TLS 接続

PostgreSQL 14: TLS 接続

3
Comments
2 min read
PostgreSQL 12: TLS 接続

PostgreSQL 12: TLS 接続

1
Comments
2 min read
5 Way to Prevent Out of Bounds Write

5 Way to Prevent Out of Bounds Write

Comments
6 min read
What Does Identity Provider Actually Mean?

What Does Identity Provider Actually Mean?

3
Comments
2 min read
Securing GraphQL APIs with Shield: Best Practices and Common Pitfalls

Securing GraphQL APIs with Shield: Best Practices and Common Pitfalls

10
Comments
8 min read
LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

LibreSSL: openssl エラー - v3_ca エクステンションが存在しない

2
Comments
1 min read
Detect and Prevent Cross-Site Scripting (XSS) in Your Web Application

Detect and Prevent Cross-Site Scripting (XSS) in Your Web Application

5
Comments
9 min read
How to Generate an SSRS Report as a Password-Protected PDF Using the Bold Reports Report Writer

How to Generate an SSRS Report as a Password-Protected PDF Using the Bold Reports Report Writer

2
Comments
5 min read
Hosting Checker - How to find out where the website is hosted via Terminal?

Hosting Checker - How to find out where the website is hosted via Terminal?

5
Comments
3 min read
Selecting the Best Authorization for Your API Integrations

Selecting the Best Authorization for Your API Integrations

Comments
6 min read
Why Docker Scout

Why Docker Scout

1
Comments
4 min read
Web Security: Understanding Request Smuggling

Web Security: Understanding Request Smuggling

25
Comments 3
3 min read
Bypass IP Restrictions with Burp Suite.

Bypass IP Restrictions with Burp Suite.

Comments
5 min read
The journey to join the offensive security highs (part 1)

The journey to join the offensive security highs (part 1)

7
Comments
4 min read
Secure your Dockerfile for SSG with NextJS and Prisma

Secure your Dockerfile for SSG with NextJS and Prisma

2
Comments
4 min read
High level guide for developing IBM QRadar Apps

High level guide for developing IBM QRadar Apps

5
Comments
4 min read
API Limiting: Best Practices and Implementation

API Limiting: Best Practices and Implementation

5
Comments
8 min read
Stack Cloud/Network/Security Certifications

Stack Cloud/Network/Security Certifications

Comments
4 min read
Hostname Verification: Preventing Man-in-the-Middle Attacks

Hostname Verification: Preventing Man-in-the-Middle Attacks

Comments
3 min read
Infrastructure Security using Azure Devops

Infrastructure Security using Azure Devops

Comments
2 min read
“Continue with Google” – How OAuth system work?

“Continue with Google” – How OAuth system work?

1
Comments
7 min read
Demystifying GraphQL Security: A Comprehensive Guide to Introspection

Demystifying GraphQL Security: A Comprehensive Guide to Introspection

23
Comments
5 min read
How to Prevent Out of Bounds Read

How to Prevent Out of Bounds Read

Comments
4 min read
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

3
Comments
3 min read
Protect Your Express.js App from XSS Attacks

Protect Your Express.js App from XSS Attacks

Comments
2 min read
Create JSON Web Tokens for development and testing

Create JSON Web Tokens for development and testing

8
Comments
2 min read
Identity Wallet Concept

Identity Wallet Concept

Comments
4 min read
Introducing APIrank.dev algorithm update - a better benchmark of 7000+ Public APIs on the internet

Introducing APIrank.dev algorithm update - a better benchmark of 7000+ Public APIs on the internet

10
Comments
1 min read
Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

Preventing Cross-Site Scripting (XSS) in Java applications with Snyk Code

Comments
7 min read
Mitigating Server-Side Request Forgery

Mitigating Server-Side Request Forgery

2
Comments
6 min read
loading...