DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Kafka HTTP Scanner: An Open-Source Web Vulnerability Scanner in Go

Building Kafka HTTP Scanner: An Open-Source Web Vulnerability Scanner in Go

7
Comments 1
4 min read
Cross-Account Parameter Sharing in AWS with RAM using Terraform: A Practical Guide

Cross-Account Parameter Sharing in AWS with RAM using Terraform: A Practical Guide

8
Comments 2
7 min read
Login Page for Modern Applications

Login Page for Modern Applications

1
Comments
6 min read
Exploring Firebase Database Security Rules

Exploring Firebase Database Security Rules

6
Comments
7 min read
Deploy Fider as a Private App on AWS with CloudFront VPC Origin

Deploy Fider as a Private App on AWS with CloudFront VPC Origin

Comments
18 min read
JavaScript Rules, Wiz Integration, Bitbucket SCM and Catching Malicious Dependencies

JavaScript Rules, Wiz Integration, Bitbucket SCM and Catching Malicious Dependencies

4
Comments
5 min read
Understanding SHA-256 and Merkle Root in Blockchain

Understanding SHA-256 and Merkle Root in Blockchain

Comments
9 min read
Implementing AWS Identity and Access Management (IAM) in Migration

Implementing AWS Identity and Access Management (IAM) in Migration

Comments
4 min read
How to Pick ⚖️ Platform Engineering Tools 🔧 in 2025 - Advanced Guide 😎

How to Pick ⚖️ Platform Engineering Tools 🔧 in 2025 - Advanced Guide 😎

7
Comments 2
3 min read
Overcoming SAML Testing Challenges with a Simple, Free Tool

Overcoming SAML Testing Challenges with a Simple, Free Tool

1
Comments
2 min read
DevOps Made Simple: A Beginner’s Guide to Securing the DevOps CI/CD with TLS Certificates

DevOps Made Simple: A Beginner’s Guide to Securing the DevOps CI/CD with TLS Certificates

7
Comments
2 min read
Is Hacking Possible? Security Vulnerabilities and Defense

Is Hacking Possible? Security Vulnerabilities and Defense

Comments
8 min read
Nmap Cheatsheet for Hackers

Nmap Cheatsheet for Hackers

3
Comments
2 min read
How my Kid’s tablet turned me into a Cybersecurity Analyst

How my Kid’s tablet turned me into a Cybersecurity Analyst

Comments 1
2 min read
Setting Up ClamAV for AWS - File Scan

Setting Up ClamAV for AWS - File Scan

Comments
2 min read
🔎 AWS GuardDuty vs. Inspector vs. Shield 🛡️: Which One Do You Need?

🔎 AWS GuardDuty vs. Inspector vs. Shield 🛡️: Which One Do You Need?

22
Comments 2
5 min read
Understanding the Next.js Middleware Bypass Vulnerability (CVE-2025-29927): A Deep Dive into CVE with CVSS 9.1

Understanding the Next.js Middleware Bypass Vulnerability (CVE-2025-29927): A Deep Dive into CVE with CVSS 9.1

3
Comments 2
6 min read
Devnexus: Bringing Java Into The Age Of AI

Devnexus: Bringing Java Into The Age Of AI

1
Comments
6 min read
Day 7: BackendChallenges.com – The Frontend Security Checklist Devs Ignore

Day 7: BackendChallenges.com – The Frontend Security Checklist Devs Ignore

Comments
1 min read
DevOps Made Simple: A Beginner’s Guide to Zero Trust Security Model for Cloud & DevOps Teams

DevOps Made Simple: A Beginner’s Guide to Zero Trust Security Model for Cloud & DevOps Teams

7
Comments
3 min read
A step-by-step guide to setting up SSH authentication with YubiKey 5.7 or later version and ED25519-SK keys on Windows 11.

A step-by-step guide to setting up SSH authentication with YubiKey 5.7 or later version and ED25519-SK keys on Windows 11.

Comments
3 min read
10 Best Practices for API Rate Limiting in 2025

10 Best Practices for API Rate Limiting in 2025

Comments
15 min read
RBAC Analytics: Key Metrics to Monitor

RBAC Analytics: Key Metrics to Monitor

Comments
5 min read
6 Must-Have Features of an API Gateway

6 Must-Have Features of an API Gateway

Comments
10 min read
Top 7 API Authentication Methods Compared

Top 7 API Authentication Methods Compared

Comments
14 min read
loading...