DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to store jwt token in cookies of browser when user loggedIn?

How to store jwt token in cookies of browser when user loggedIn?

6
Comments 5
1 min read
Common security gotchas in Python and few tips about using HTTP

Common security gotchas in Python and few tips about using HTTP

35
Comments
2 min read
Data Protection and protecting your users in light of GDPR

Data Protection and protecting your users in light of GDPR

6
Comments 2
6 min read
Would CTF tutorial interest you?

Would CTF tutorial interest you?

7
Comments 4
1 min read
An interactive tutorial of the Capital One data breach

An interactive tutorial of the Capital One data breach

5
Comments
1 min read
An interactive demo of the TikTok XSS vulnerability

An interactive demo of the TikTok XSS vulnerability

7
Comments 1
1 min read
Easy Steps to Integrate ASOS in ASP.NET Core API

Easy Steps to Integrate ASOS in ASP.NET Core API

8
Comments
2 min read
Automated local HTTPS environment with Traefik

Automated local HTTPS environment with Traefik

9
Comments
1 min read
Using OpenSSL to Create Certificates

Using OpenSSL to Create Certificates

3
Comments
9 min read
🔐 Shhh, a web-app to share encrypted secrets using secured links with passphrases and expiration dates.

🔐 Shhh, a web-app to share encrypted secrets using secured links with passphrases and expiration dates.

50
Comments 2
1 min read
¿WhoUr? A Tool for information gathering, IPReverse, AdminFinder, DNS, WHOIS, SQLi Scanner with google.

¿WhoUr? A Tool for information gathering, IPReverse, AdminFinder, DNS, WHOIS, SQLi Scanner with google.

5
Comments
1 min read
¿js.apies.org who is? ¡Wordpress WebShell!

¿js.apies.org who is? ¡Wordpress WebShell!

4
Comments
1 min read
Getting Started with LightHouse CI - Part 1

Getting Started with LightHouse CI - Part 1

5
Comments
4 min read
7 Best Practices for JSON Web Tokens

7 Best Practices for JSON Web Tokens

79
Comments 22
7 min read
Come to our security workshop this Saturday in NYC

Come to our security workshop this Saturday in NYC

6
Comments
1 min read
36th Chaos Communication Congress (36C3) reflections

36th Chaos Communication Congress (36C3) reflections

7
Comments
3 min read
Should you encrypt or compress first?

Should you encrypt or compress first?

33
Comments 9
6 min read
💻👉My top 6 talks from the first day of the #36c3 congress aka chaos communication congress 2019 plus one bonus

💻👉My top 6 talks from the first day of the #36c3 congress aka chaos communication congress 2019 plus one bonus

52
Comments 2
4 min read
Realme 5 and 5s receive updates with December 2019 security patches

Realme 5 and 5s receive updates with December 2019 security patches

4
Comments
2 min read
MongoDB ransoms in 2017

MongoDB ransoms in 2017

2
Comments
2 min read
What personal privacy/security measures do you take?

What personal privacy/security measures do you take?

5
Comments 37
1 min read
💻👉My top 6 talks from the fourth day of the #36c3 congress aka chaos communication congress 2019

💻👉My top 6 talks from the fourth day of the #36c3 congress aka chaos communication congress 2019

14
Comments 2
2 min read
💻👉My top 6 talks from the third day of the #36c3 congress aka chaos communication congress 2019

💻👉My top 6 talks from the third day of the #36c3 congress aka chaos communication congress 2019

35
Comments
3 min read
💻👉My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019

💻👉My top 6 talks from the second day of the #36c3 congress aka chaos communication congress 2019

14
Comments
3 min read
How to implement Security to connect monolithic Spring 3 application with spring boot microservice?

How to implement Security to connect monolithic Spring 3 application with spring boot microservice?

3
Comments 1
1 min read
Debugging in prod: Maximizing user attack surface

Debugging in prod: Maximizing user attack surface

7
Comments
2 min read
How To Generate Git SSH Keys

How To Generate Git SSH Keys

5
Comments
4 min read
How you can check you have been hacked or not for free?

How you can check you have been hacked or not for free?

5
Comments
2 min read
Certificate Pinning in Android

Certificate Pinning in Android

8
Comments 3
2 min read
Practice with AWS Access analyzer

Practice with AWS Access analyzer

6
Comments
2 min read
Device Interconnections Monitor

Device Interconnections Monitor

4
Comments
1 min read
Microservices: OAuth2 vs Simple JWT Authentication

Microservices: OAuth2 vs Simple JWT Authentication

6
Comments 2
1 min read
How to Detect the .bt WordPress Hack

How to Detect the .bt WordPress Hack

6
Comments
4 min read
#30DaysOfThreads - The Cyber Attack Lifecycle

#30DaysOfThreads - The Cyber Attack Lifecycle

6
Comments 2
2 min read
Create a Secure Azure Sphere App using the Grove Shield Sensor Kit

Create a Secure Azure Sphere App using the Grove Shield Sensor Kit

8
Comments
7 min read
SQL is Insecure

SQL is Insecure

6
Comments 31
2 min read
MQTT Security

MQTT Security

7
Comments
2 min read
Tips for container, DNS & database security

Tips for container, DNS & database security

37
Comments
2 min read
Scale Securely with Transit Gateway

Scale Securely with Transit Gateway

2
Comments
1 min read
10 Signs showing your WordPress Site is Hacked

10 Signs showing your WordPress Site is Hacked

4
Comments
7 min read
About error handling in Go; logging best practices; & ATO attacks

About error handling in Go; logging best practices; & ATO attacks

39
Comments
2 min read
Security Risks of 5G Networks

Security Risks of 5G Networks

5
Comments
5 min read
How does delegated credential works?

How does delegated credential works?

6
Comments
1 min read
Tips on avoiding intellectual property theft in outsourcing

Tips on avoiding intellectual property theft in outsourcing

4
Comments
4 min read
AWS protect SSRF vulnerabilities with new EC2 Instance Metadata feature

AWS protect SSRF vulnerabilities with new EC2 Instance Metadata feature

12
Comments
1 min read
Integrate static security checking for python!

Integrate static security checking for python!

7
Comments
2 min read
Reverse Shell Generation.

Reverse Shell Generation.

3
Comments
1 min read
Top Tricks Hackers do to infect your system on Social Internet

Top Tricks Hackers do to infect your system on Social Internet

6
Comments
1 min read
Create a Content Security Policy (CSP) in Hugo

Create a Content Security Policy (CSP) in Hugo

12
Comments
5 min read
Preventing Homoglyph attacks with OCR.

Preventing Homoglyph attacks with OCR.

17
Comments
4 min read
Top 5 Best Practices for Angular App Security

Top 5 Best Practices for Angular App Security

13
Comments
5 min read
Serverless Security with Unikernels

Serverless Security with Unikernels

9
Comments
12 min read
Third party

Third party

6
Comments
4 min read
Distributed Rant Series Part 2

Distributed Rant Series Part 2

6
Comments
6 min read
Distributed Rant Series Part 1

Distributed Rant Series Part 1

4
Comments 1
2 min read
How to minimize security concerns in your applications

How to minimize security concerns in your applications

35
Comments 5
2 min read
How to deal with outsourcing fraud

How to deal with outsourcing fraud

6
Comments
4 min read
Firewalls on Linux

Firewalls on Linux

9
Comments
2 min read
Silent push for the web

Silent push for the web

5
Comments
3 min read
Lead SDET Opportunity - Banyan Security (San Francisco)

Lead SDET Opportunity - Banyan Security (San Francisco)

3
Comments
1 min read
loading...