DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hacked by… Postman?

Hacked by… Postman?

Comments 1
1 min read
Step by Step Guide to Remediate Data Vulnerability

Step by Step Guide to Remediate Data Vulnerability

1
Comments
2 min read
Authorization In Laravel - A Beginner's Guide

Authorization In Laravel - A Beginner's Guide

Comments
3 min read
The Human Dependency Graph: Why We Need to Rethink Security in Open Source

The Human Dependency Graph: Why We Need to Rethink Security in Open Source

4
Comments
4 min read
Day 28 - Secure Your Kubernetes Deployments: A Beginner's Guide to Anchore

Day 28 - Secure Your Kubernetes Deployments: A Beginner's Guide to Anchore

3
Comments
3 min read
10 Tips for Efficiently Using Python in Web Development

10 Tips for Efficiently Using Python in Web Development

Comments
2 min read
Enhancing Security: A Guide to System Hardening and AWS Tools 🛡️

Enhancing Security: A Guide to System Hardening and AWS Tools 🛡️

1
Comments
3 min read
Azure AI Security Best Practices: How Microsoft Protects AI Workloads

Azure AI Security Best Practices: How Microsoft Protects AI Workloads

3
Comments
4 min read
Combining the benefits of session tokens and JWTs

Combining the benefits of session tokens and JWTs

8
Comments
6 min read
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
How to use PwnFox with Burp Suite

How to use PwnFox with Burp Suite

4
Comments
3 min read
Manage Sensitive API Keys in Public Dotfiles Using PGP and SOPS

Manage Sensitive API Keys in Public Dotfiles Using PGP and SOPS

1
Comments
8 min read
How to remove your secrets from your Git repository?

How to remove your secrets from your Git repository?

1
Comments
2 min read
Why Cyber Security Testing is Essential for Compliance and Regulation

Why Cyber Security Testing is Essential for Compliance and Regulation

3
Comments 1
5 min read
🚀 Enhancing Container Security: The Complete Guide to Secure and Clean Kubernetes Clusters 🛡️🧼

🚀 Enhancing Container Security: The Complete Guide to Secure and Clean Kubernetes Clusters 🛡️🧼

2
Comments
4 min read
VPC explained!

VPC explained!

Comments
9 min read
Understanding the JWT

Understanding the JWT

1
Comments
4 min read
Integrating Firebase Authentication into NestJS with nestjs-firebase-auth

Integrating Firebase Authentication into NestJS with nestjs-firebase-auth

4
Comments
4 min read
Spring Security For Beginners — Part 1

Spring Security For Beginners — Part 1

1
Comments 1
4 min read
Cold Storage: A Deep Dive into the Frozen Vaults of Data

Cold Storage: A Deep Dive into the Frozen Vaults of Data

2
Comments
11 min read
DEF CON 32: What We Learned About Secrets Security at AppSec Village

DEF CON 32: What We Learned About Secrets Security at AppSec Village

8
Comments 1
9 min read
Archivo .env para las variables de entorno en Python

Archivo .env para las variables de entorno en Python

1
Comments
2 min read
Solana and Ethereum Internals: A Human-Centric Exploration

Solana and Ethereum Internals: A Human-Centric Exploration

1
Comments
4 min read
What Is a Distributed Denial-of-Service attack

What Is a Distributed Denial-of-Service attack

Comments
1 min read
🚀 Boost Your Node.js Security with Helmet.js! 🛡️

🚀 Boost Your Node.js Security with Helmet.js! 🛡️

Comments
1 min read
Mastering Security and Compliance in the AWS Cloud

Mastering Security and Compliance in the AWS Cloud

5
Comments
5 min read
Install and Configure Proxmox VE with Windows Server VM set up and configured for Active Directory.

Install and Configure Proxmox VE with Windows Server VM set up and configured for Active Directory.

2
Comments
7 min read
How an API Gateway Will Help You Scale, Secure, & Simplify Your API

How an API Gateway Will Help You Scale, Secure, & Simplify Your API

Comments
8 min read
About the gosec G115 drama, or how I faced back integer conversion overflow in Go 🤯

About the gosec G115 drama, or how I faced back integer conversion overflow in Go 🤯

27
Comments 1
2 min read
OAuth2 in Simple Terms

OAuth2 in Simple Terms

Comments
10 min read
Transforming Email API Chaos into Order

Transforming Email API Chaos into Order

9
Comments
4 min read
Understanding Single Sign-On (SSO) and SAML: Simplified

Understanding Single Sign-On (SSO) and SAML: Simplified

5
Comments 2
3 min read
Managing Cloud Costs and Security with Tailwarden

Managing Cloud Costs and Security with Tailwarden

Comments
5 min read
Data Security Strategy Beyond Access Control: Data Encryption

Data Security Strategy Beyond Access Control: Data Encryption

2
Comments
5 min read
Stereotype of a Nigeria Hacker

Stereotype of a Nigeria Hacker

6
Comments 3
2 min read
Secure your app in just a few lines of code using Arcjet! ✈️

Secure your app in just a few lines of code using Arcjet! ✈️

44
Comments 9
6 min read
🌐 MongoDB在金融行业: 向量搜索和ACID事务 💰

🌐 MongoDB在金融行业: 向量搜索和ACID事务 💰

5
Comments
1 min read
Session, Cookie, JWT, Token, SSO, and OAuth 2.0

Session, Cookie, JWT, Token, SSO, and OAuth 2.0

6
Comments 1
3 min read
Implementing Single Sign-On (SSO) in Your Microsoft Teams Bot App [Part II]

Implementing Single Sign-On (SSO) in Your Microsoft Teams Bot App [Part II]

2
Comments
5 min read
How to remove a leaked .env file from GitHub permanently...

How to remove a leaked .env file from GitHub permanently...

101
Comments 24
2 min read
How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

52
Comments
3 min read
Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security

Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security

Comments
2 min read
Boosting Incident Response Capabilities with Azure: A Practical Guide

Boosting Incident Response Capabilities with Azure: A Practical Guide

1
Comments
6 min read
Using reCAPTCHA v3 with Next.js 14

Using reCAPTCHA v3 with Next.js 14

8
Comments 1
3 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

2
Comments
4 min read
Resolve "Blocked by CORS Policy: No 'Access-Control-Allow-Origin'" in Laravel

Resolve "Blocked by CORS Policy: No 'Access-Control-Allow-Origin'" in Laravel

23
Comments 1
4 min read
Security news weekly round-up - 6th September 2024

Security news weekly round-up - 6th September 2024

1
Comments
2 min read
Server actions in Next.js

Server actions in Next.js

3
Comments
4 min read
Automated Security Scanning for Docker Images on AWS

Automated Security Scanning for Docker Images on AWS

Comments
14 min read
Introduction to Mastering Authentication

Introduction to Mastering Authentication

4
Comments
5 min read
Polyfills - a filler or a gaping hole? (Part-1)

Polyfills - a filler or a gaping hole? (Part-1)

1
Comments
3 min read
Cybersecurity – Protecting Your Business in the Digital Age

Cybersecurity – Protecting Your Business in the Digital Age

Comments
4 min read
🛡️ Mastering HTTP Security Headers

🛡️ Mastering HTTP Security Headers

20
Comments
8 min read
Types of DNS attacks

Types of DNS attacks

2
Comments
8 min read
Resourcely adds Atlantis Support

Resourcely adds Atlantis Support

Comments
2 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
Use Terraform module from a private git project with Atlantis

Use Terraform module from a private git project with Atlantis

Comments
2 min read
Afterlife.exe: The Afterlife of Your Digital Footprint

Afterlife.exe: The Afterlife of Your Digital Footprint

3
Comments 2
3 min read
💻 Get started: MongoDB Cluster Infrastructure and Cryptographic Security 💻

💻 Get started: MongoDB Cluster Infrastructure and Cryptographic Security 💻

10
Comments
2 min read
💻 入门: MongoDB 集群基础设施和加密安全 💻

💻 入门: MongoDB 集群基础设施和加密安全 💻

10
Comments
1 min read
loading...