DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OAuth 2.1 is Here: What You Need to Know

OAuth 2.1 is Here: What You Need to Know

17
Comments
6 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Using the Trusty API to discover deprecated and malicious packages.

Using the Trusty API to discover deprecated and malicious packages.

3
Comments
2 min read
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

14
Comments
2 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

4
Comments
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

2
Comments
2 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

6
Comments 2
4 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

22
Comments 2
2 min read
.NET 8.0 - Securing the API with JWT Bearer Token

.NET 8.0 - Securing the API with JWT Bearer Token

140
Comments 1
5 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

Comments
5 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

19
Comments 1
5 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

1
Comments
2 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
Dev: Security

Dev: Security

Comments
3 min read
Integrating reCAPTCHA v3 in Next.js

Integrating reCAPTCHA v3 in Next.js

23
Comments 2
2 min read
CodeBehind 2.7 Released, Role Access Added!

CodeBehind 2.7 Released, Role Access Added!

1
Comments
7 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Proposal - Blockchain Coordination

Proposal - Blockchain Coordination

Comments
5 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

5
Comments
7 min read
Types of Computer Security Threats

Types of Computer Security Threats

1
Comments
8 min read
Mastering Cloudflare Ruleset Engine with Terraform

Mastering Cloudflare Ruleset Engine with Terraform

10
Comments 1
5 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Security news weekly round-up - 14th June 2024

Security news weekly round-up - 14th June 2024

1
Comments
3 min read
5 Essential Cybersecurity Tips to Secure Your Business in 2024

5 Essential Cybersecurity Tips to Secure Your Business in 2024

1
Comments
3 min read
Build an Antivirus with Python (Beginners Guide)

Build an Antivirus with Python (Beginners Guide)

12
Comments
9 min read
All About Web Security

All About Web Security

2
Comments
3 min read
Enabling Workload Identity Federation for Github Actions on GCP

Enabling Workload Identity Federation for Github Actions on GCP

Comments
1 min read
Understanding API Keys, JWT, and Secure Authentication Methods

Understanding API Keys, JWT, and Secure Authentication Methods

4
Comments
3 min read
Build OAuth 2.0 Server & API Server with Authlete + Spring Boot

Build OAuth 2.0 Server & API Server with Authlete + Spring Boot

2
Comments
4 min read
BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

2
Comments 1
5 min read
Building a Fort Knox DevSecOps: Comprehensive Security Practices

Building a Fort Knox DevSecOps: Comprehensive Security Practices

21
Comments
10 min read
FindAll - Automated analysis of network security emergency response tools.

FindAll - Automated analysis of network security emergency response tools.

2
Comments
3 min read
TECNO Web Security Challenge Campaign starts now

TECNO Web Security Challenge Campaign starts now

2
Comments
1 min read
Fine-Grained Access Control (FGAC): Comprehensive Guidance

Fine-Grained Access Control (FGAC): Comprehensive Guidance

16
Comments
13 min read
Announcements from AWS re:Inforce 2024 Keynote

Announcements from AWS re:Inforce 2024 Keynote

4
Comments 1
6 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest

Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest

1
Comments
6 min read
NodeJS Security Middlewares

NodeJS Security Middlewares

Comments
2 min read
How to identify a phishing Email in 2024

How to identify a phishing Email in 2024

9
Comments 2
6 min read
What is HashiCorp Vault?

What is HashiCorp Vault?

Comments
3 min read
My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

2
Comments
5 min read
Issue 47 and 48 of AWS Cloud Security Weekly

Issue 47 and 48 of AWS Cloud Security Weekly

3
Comments
3 min read
Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

2
Comments
2 min read
Lập trình web phải phân biệt được Session và Cookie

Lập trình web phải phân biệt được Session và Cookie

Comments 1
4 min read
EKS Secret Management — with Golang, AWS ParameterStore and Terraform

EKS Secret Management — with Golang, AWS ParameterStore and Terraform

29
Comments 2
11 min read
Set up an automated incident management response using AWS

Set up an automated incident management response using AWS

2
Comments
9 min read
How to configure Server-Side Encryption (SSE-S3) in Amazon S3?

How to configure Server-Side Encryption (SSE-S3) in Amazon S3?

10
Comments
3 min read
about kelvin, a terminal password manager i'm building

about kelvin, a terminal password manager i'm building

6
Comments
6 min read
How To Manage Amazon Inspector in AWS Organizations Using Terraform

How To Manage Amazon Inspector in AWS Organizations Using Terraform

5
Comments
6 min read
Identifying Container Image Vulnerabilities with Docker Scout

Identifying Container Image Vulnerabilities with Docker Scout

1
Comments
1 min read
Exposing the Deception: Discord Account Generator with Hidden Malware

Exposing the Deception: Discord Account Generator with Hidden Malware

14
Comments 2
5 min read
GitHub Release Action for the Python Package Index

GitHub Release Action for the Python Package Index

Comments 2
18 min read
loading...