DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

12
Comments
6 min read
Securing Firebase Connections in Next.js with HTTPS

Securing Firebase Connections in Next.js with HTTPS

Comments
2 min read
Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

13
Comments 1
10 min read
Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

8
Comments
6 min read
Top 10 Application Security Vulnerabilities in 2024

Top 10 Application Security Vulnerabilities in 2024

18
Comments
6 min read
𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚

𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚

5
Comments 7
1 min read
Tokenization vs encryption

Tokenization vs encryption

1
Comments
4 min read
Securing Data at Rest: The Importance of Encryption and How to Implement It

Securing Data at Rest: The Importance of Encryption and How to Implement It

Comments
3 min read
Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Comments
2 min read
Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

4
Comments
4 min read
Code Smell 258 - Secrets in Code

Code Smell 258 - Secrets in Code

4
Comments
2 min read
The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

1
Comments
6 min read
Webhooks vs. polling

Webhooks vs. polling

76
Comments 7
3 min read
Como um Malware opera, quais são os seus tipos e como se proteger.

Como um Malware opera, quais são os seus tipos e como se proteger.

3
Comments
5 min read
Gitleaks: Find forgotten codes in your repositories

Gitleaks: Find forgotten codes in your repositories

Comments
1 min read
Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Comments
5 min read
SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

Comments
2 min read
Usando PAM no Linux

Usando PAM no Linux

4
Comments
4 min read
Security news weekly round-up - 12th July 2024

Security news weekly round-up - 12th July 2024

Comments
4 min read
Mitigating XSS Risks: Best Practices for Web Applications

Mitigating XSS Risks: Best Practices for Web Applications

7
Comments
4 min read
Enhancing PostgreSQL Security with the Credcheck Extension

Enhancing PostgreSQL Security with the Credcheck Extension

1
Comments
1 min read
How AI and Machine Learning Are Revolutionizing IT Services

How AI and Machine Learning Are Revolutionizing IT Services

Comments
2 min read
DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

11
Comments
1 min read
New Securi-Taco Tuesdays Livestream (Monthly)

New Securi-Taco Tuesdays Livestream (Monthly)

2
Comments
2 min read
HTB Academy: Information Gathering - Web Edition Module: Skills Assessment (Part II, Question 5)

HTB Academy: Information Gathering - Web Edition Module: Skills Assessment (Part II, Question 5)

17
Comments
2 min read
Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

2
Comments
2 min read
Foremost ที่ไม่ใช่ นม

Foremost ที่ไม่ใช่ นม

1
Comments
1 min read
Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

1
Comments 1
7 min read
VaultWarden: Your local password manager

VaultWarden: Your local password manager

3
Comments
5 min read
Creating Cross-Account DynamoDB Backups with Terraform

Creating Cross-Account DynamoDB Backups with Terraform

1
Comments
4 min read
DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

1
Comments
1 min read
Issue 52 of AWS Cloud Security Weekly

Issue 52 of AWS Cloud Security Weekly

4
Comments
1 min read
Cloud Native Live: Automate pinning GitHub Actions and container images to their digests

Cloud Native Live: Automate pinning GitHub Actions and container images to their digests

3
Comments
1 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

3
Comments
7 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

1
Comments
2 min read
Build vs. Buy: How to approach SSO for your SaaS app

Build vs. Buy: How to approach SSO for your SaaS app

1
Comments
4 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Understanding self-assumption and scoped-down policy in AWS IAM

Understanding self-assumption and scoped-down policy in AWS IAM

7
Comments 1
3 min read
Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Comments
2 min read
AWS: Kubernetes and Access Management API, the new authentication in EKS

AWS: Kubernetes and Access Management API, the new authentication in EKS

1
Comments 1
11 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Recreating Stripe’s Roles in PropelAuth

Recreating Stripe’s Roles in PropelAuth

Comments
5 min read
How to Protect Your Application from AI Bots

How to Protect Your Application from AI Bots

4
Comments
10 min read
Internet security through lava lamps

Internet security through lava lamps

Comments
3 min read
AI and Data Privacy: Balancing Innovation and Security in the Digital Age

AI and Data Privacy: Balancing Innovation and Security in the Digital Age

1
Comments
11 min read
WebCheck: Find out what hackers know about your site

WebCheck: Find out what hackers know about your site

1
Comments
1 min read
AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

Comments
12 min read
OAuth em aplicações SPA / Mobile (PKCE extension)

OAuth em aplicações SPA / Mobile (PKCE extension)

1
Comments
4 min read
Understanding self-assumption and scoped down policy of an AWS IAM role

Understanding self-assumption and scoped down policy of an AWS IAM role

4
Comments
2 min read
API Security Fundamentals: Key Practices for Developers

API Security Fundamentals: Key Practices for Developers

3
Comments 1
13 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
AWS Cognito - IAM in the Cloud

AWS Cognito - IAM in the Cloud

1
Comments
3 min read
Execute JavaScript in a WebAssembly QuickJS Sandbox

Execute JavaScript in a WebAssembly QuickJS Sandbox

5
Comments
4 min read
Beyond JWT: Unlocking PASETO for Secure Token Management

Beyond JWT: Unlocking PASETO for Secure Token Management

3
Comments
7 min read
JavaScript app security audit

JavaScript app security audit

1
Comments
2 min read
Top Search Engines for Pentesters

Top Search Engines for Pentesters

Comments
1 min read
Securing Your APIs: A Guide to Design Patterns for Robust Defense

Securing Your APIs: A Guide to Design Patterns for Robust Defense

2
Comments
3 min read
5 Auth0 Gotchas to Consider

5 Auth0 Gotchas to Consider

Comments
3 min read
SSH Config for Multiple SSH Authentication

SSH Config for Multiple SSH Authentication

14
Comments
1 min read
loading...