DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Access to Connected Devices

Secure Access to Connected Devices

Comments
2 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

3
Comments
2 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
Protecting Sensitive Data using Ansible Vault

Protecting Sensitive Data using Ansible Vault

2
Comments
4 min read
Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
What Technologies Help Prevent Cyber Attacks? 🛡️💻

What Technologies Help Prevent Cyber Attacks? 🛡️💻

2
Comments
1 min read
𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

1
Comments
1 min read
Level Up Your GitHub Repo Config Game

Level Up Your GitHub Repo Config Game

3
Comments
1 min read
How to Apply a Magento 2 Patch

How to Apply a Magento 2 Patch

5
Comments 2
2 min read
JWT for Developers: Behind the Scenes.

JWT for Developers: Behind the Scenes.

4
Comments 1
4 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
How to Design Secure and Safe APIs: 12 Essential Tips for API Security

How to Design Secure and Safe APIs: 12 Essential Tips for API Security

2
Comments
3 min read
Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

6
Comments
1 min read
Gone in 120 seconds

Gone in 120 seconds

1
Comments
5 min read
How to Implement Two-Factor Authentication (2FA) in Golang

How to Implement Two-Factor Authentication (2FA) in Golang

16
Comments
16 min read
Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

3
Comments 1
1 min read
Intro to Application Security

Intro to Application Security

23
Comments 6
3 min read
AWS All Builders Welcome Grant & re:Inforce Newbie

AWS All Builders Welcome Grant & re:Inforce Newbie

3
Comments 1
4 min read
Cybersecurity 101 for Developers: From Zero to Hero

Cybersecurity 101 for Developers: From Zero to Hero

4
Comments
4 min read
Security in Requirements phase

Security in Requirements phase

4
Comments 2
8 min read
I'm Under DDoS Attack

I'm Under DDoS Attack

8
Comments
6 min read
When has rolling your own auth gone wrong?

When has rolling your own auth gone wrong?

Comments 1
2 min read
Understanding Security Context in Kubernetes

Understanding Security Context in Kubernetes

6
Comments 1
2 min read
[Python] Tool Hacking Plus

[Python] Tool Hacking Plus

Comments
1 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
OWASP Dependency Check in Node js 🛡️

OWASP Dependency Check in Node js 🛡️

7
Comments
1 min read
Creating your own security attribute with Symfony

Creating your own security attribute with Symfony

3
Comments
2 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
Memo to pass AWS Certified Security Specialty(SCS-C02)

Memo to pass AWS Certified Security Specialty(SCS-C02)

3
Comments
1 min read
Security news weekly round-up - 28th June 2024

Security news weekly round-up - 28th June 2024

2
Comments
3 min read
Understanding and Preventing XSS Attacks in C# Applications

Understanding and Preventing XSS Attacks in C# Applications

3
Comments
2 min read
Protecting User Data: Encryption and Secure Storage in Frontend

Protecting User Data: Encryption and Secure Storage in Frontend

2
Comments
7 min read
Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
Leveraging Environment Variables in Next.js for Secure Data Access

Leveraging Environment Variables in Next.js for Secure Data Access

2
Comments
2 min read
Why single sign-on (SSO) is better

Why single sign-on (SSO) is better

25
Comments 1
5 min read
The End of X (Or, It Should Be): How Elon Killed Twitter

The End of X (Or, It Should Be): How Elon Killed Twitter

44
Comments 31
10 min read
BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

Comments
6 min read
Using ModSecurity in Nginx project — maintaining protection on WordPress

Using ModSecurity in Nginx project — maintaining protection on WordPress

7
Comments
8 min read
Cybersecurity in the Age of Digital Transformation

Cybersecurity in the Age of Digital Transformation

5
Comments
2 min read
Serverless on GCP using Cloud Functions

Serverless on GCP using Cloud Functions

2
Comments 2
1 min read
Webhook Security Approaches

Webhook Security Approaches

8
Comments
3 min read
Drupal Access Policy demystified

Drupal Access Policy demystified

4
Comments 3
12 min read
Amazon GuardDuty Malware Protection for Amazon S3

Amazon GuardDuty Malware Protection for Amazon S3

3
Comments
2 min read
Managing and Rotating Secrets with AWS Secrets Manager

Managing and Rotating Secrets with AWS Secrets Manager

12
Comments
4 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

4
Comments
10 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

52
Comments
9 min read
The Body Shop of Security: Biometrics

The Body Shop of Security: Biometrics

24
Comments
2 min read
Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Comments
2 min read
Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

25
Comments
2 min read
Nations attacking their own internet (to stop cheating on exams)

Nations attacking their own internet (to stop cheating on exams)

16
Comments 1
1 min read
Best Python Libraries for Cybersecurity in 2024

Best Python Libraries for Cybersecurity in 2024

12
Comments 8
13 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

290
Comments 1
10 min read
A primer on open-source intelligence for bug bounty hunting in Grafana

A primer on open-source intelligence for bug bounty hunting in Grafana

5
Comments
10 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

Comments
2 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

Comments 2
2 min read
Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

Comments
2 min read
Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

1
Comments
8 min read
loading...