DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

4
Comments
2 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
How to protect your .NET Web API against Common Security Threats

How to protect your .NET Web API against Common Security Threats

3
Comments
13 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

1
Comments
1 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

1
Comments
2 min read
Quality software = Secure software

Quality software = Secure software

Comments
3 min read
SQL Injection - In Just 5 Minutes!

SQL Injection - In Just 5 Minutes!

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Comments
1 min read
JWT in Action: Secure Authentication & Authorization in Go

JWT in Action: Secure Authentication & Authorization in Go

6
Comments
9 min read
Email Verification with Sent Codes in Ruby on Rails without Devise

Email Verification with Sent Codes in Ruby on Rails without Devise

15
Comments 2
5 min read
How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

Comments
7 min read
Daily Quantum Learning #8 - Quantum Annealing

Daily Quantum Learning #8 - Quantum Annealing

1
Comments
2 min read
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
The Speakeasy Door to Your Network - Port Knocking (2)

The Speakeasy Door to Your Network - Port Knocking (2)

Comments
4 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Why Cloud Security Needs a New Playbook: Introducing CNAMM

Why Cloud Security Needs a New Playbook: Introducing CNAMM

Comments
4 min read
𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

Comments
1 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

1
Comments
4 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
4 min read
How to Run Models Locally: A Step-by-Step Guide for Non-Techies

How to Run Models Locally: A Step-by-Step Guide for Non-Techies

2
Comments
3 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
loading...