DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
[SĂ©rie Auth/Aut] Introduction : l'importance du contrĂŽle d'accĂšs

[SĂ©rie Auth/Aut] Introduction : l'importance du contrĂŽle d'accĂšs

5
Comments
5 min read
5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments
4 min read
APIs and Security Best Practices: JavaScript and Python Examples

APIs and Security Best Practices: JavaScript and Python Examples

1
Comments
5 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments
2 min read
Access Microsoft 365 resources from custom on premise application

Access Microsoft 365 resources from custom on premise application

1
Comments 1
9 min read
Sidecar Containers in Kubernetes

Sidecar Containers in Kubernetes

Comments
7 min read
How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

Comments
11 min read
Automating CI/CD Pipeline Migration with GitHub Actions Importer

Automating CI/CD Pipeline Migration with GitHub Actions Importer

8
Comments
5 min read
A Guide to Root Access for AWS S3 Buckets

A Guide to Root Access for AWS S3 Buckets

1
Comments
3 min read
Wireless Security Configuration: Protect Your Network Now!

Wireless Security Configuration: Protect Your Network Now!

Comments
3 min read
Session Management, Tokens & Refresh Tokens

Session Management, Tokens & Refresh Tokens

2
Comments
4 min read
What Is Training Data Poisoning in LLMs & 6 Ways to Prevent It

What Is Training Data Poisoning in LLMs & 6 Ways to Prevent It

Comments
1 min read
Horizontal privilege escalation

Horizontal privilege escalation

1
Comments
1 min read
Security in the Cloud: Your Role in the Shared Responsibility Model

Security in the Cloud: Your Role in the Shared Responsibility Model

10
Comments
8 min read
Unlocking the Power of Linux Device Drivers

Unlocking the Power of Linux Device Drivers

Comments
7 min read
Web Services Security

Web Services Security

Comments
2 min read
Stay Safe Online: Why You Need Two-Step Verification Now!

Stay Safe Online: Why You Need Two-Step Verification Now!

1
Comments
2 min read
Day 6/90: File Permissions and Access Control Lists in Linux 🔐 #90DaysOfDevOps

Day 6/90: File Permissions and Access Control Lists in Linux 🔐 #90DaysOfDevOps

Comments
2 min read
How to create an image authentication system with python streamlit and canva!

How to create an image authentication system with python streamlit and canva!

1
Comments 2
2 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

6
Comments
4 min read
Introducing the DNA-KEY System: Taking the Password Generator to the Next Level! 🔐

Introducing the DNA-KEY System: Taking the Password Generator to the Next Level! 🔐

Comments
1 min read
[Pass AWS SCS-C02 on the first try!] A security beginner passed AWS SCS in just 2 weeks

[Pass AWS SCS-C02 on the first try!] A security beginner passed AWS SCS in just 2 weeks

Comments
2 min read
Protect Your Phone from Hackers

Protect Your Phone from Hackers

7
Comments
3 min read
What is Aws Macie ? How to discover data with Macie ?

What is Aws Macie ? How to discover data with Macie ?

1
Comments
2 min read
Introducing Amazon GuardDuty Detector Checker: Verify Enablement and Finding Publishing Configurations

Introducing Amazon GuardDuty Detector Checker: Verify Enablement and Finding Publishing Configurations

1
Comments
2 min read
Unlock Ultimate Security: How to Use YubiKey (or Any Security Key) for Passwordless Access in Azure Virtual Machines!

Unlock Ultimate Security: How to Use YubiKey (or Any Security Key) for Passwordless Access in Azure Virtual Machines!

6
Comments
3 min read
How Magento’s Security Scan Tool Protects Your Storefront from Threats

How Magento’s Security Scan Tool Protects Your Storefront from Threats

Comments
4 min read
Simulando AWS KMS con LocalStack y Node.js: Una GuĂ­a para Desarrolladores

Simulando AWS KMS con LocalStack y Node.js: Una GuĂ­a para Desarrolladores

Comments
5 min read
Securing Plain Text using SHA hashing: SHA-256 Sorcery

Securing Plain Text using SHA hashing: SHA-256 Sorcery

6
Comments
2 min read
Reset unknown Windows' administrator password

Reset unknown Windows' administrator password

Comments
2 min read
Aws GuardDuty and S3 Malware Protection with GuardDuty

Aws GuardDuty and S3 Malware Protection with GuardDuty

Comments
2 min read
Linux on Termux

Linux on Termux

Comments
1 min read
CornCon X: Powering Cybersecurity Innovation Through Human Connection

CornCon X: Powering Cybersecurity Innovation Through Human Connection

3
Comments 1
8 min read
The Intersection of Data Science and Cybersecurity

The Intersection of Data Science and Cybersecurity

4
Comments
3 min read
HackTheBox - Writeup Editorial [Retired]

HackTheBox - Writeup Editorial [Retired]

Comments
12 min read
Is Fail2ban Enough to Secure Your Linux Server?

Is Fail2ban Enough to Secure Your Linux Server?

Comments
3 min read
Protecting Your APIs: Understanding Authentication and Authorization

Protecting Your APIs: Understanding Authentication and Authorization

2
Comments
4 min read
Securing Java Web Applications: Best Practices and Java EE Features

Securing Java Web Applications: Best Practices and Java EE Features

1
Comments
9 min read
CĂłmo Realizar y Detectar Ataques de Path Injection

CĂłmo Realizar y Detectar Ataques de Path Injection

Comments
6 min read
How to Securely Remove a File from Git History: A Step-by-Step Guide

How to Securely Remove a File from Git History: A Step-by-Step Guide

1
Comments
3 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments
3 min read
Cloud Computing Security Best Practices for Enterprises

Cloud Computing Security Best Practices for Enterprises

Comments
7 min read
Reset password in uptime kuma

Reset password in uptime kuma

Comments
2 min read
The Anatomy of a Wi-Fi Attack: Uncovering the Cracks in WPA/WPA2 Security

The Anatomy of a Wi-Fi Attack: Uncovering the Cracks in WPA/WPA2 Security

Comments
4 min read
Understanding CSRF Attacks: Safeguarding Your Web Applications

Understanding CSRF Attacks: Safeguarding Your Web Applications

8
Comments
3 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Understanding Multi-Factor Authentication: A Deep Dive into MFA

Understanding Multi-Factor Authentication: A Deep Dive into MFA

1
Comments
4 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

Comments
5 min read
Building a Secure Event Booking App with FACEIO and Svelte

Building a Secure Event Booking App with FACEIO and Svelte

6
Comments
9 min read
From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

Comments
6 min read
AI Security: How to Protect Your Projects with Hardened ModelKits

AI Security: How to Protect Your Projects with Hardened ModelKits

44
Comments
7 min read
KeyRunner: Not Just Another API Client-Your Secure Choice for API interactions in VSCode & Desktop!

KeyRunner: Not Just Another API Client-Your Secure Choice for API interactions in VSCode & Desktop!

Comments
1 min read
AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

1
Comments
2 min read
Making Passwords Optional: What You Need to Know

Making Passwords Optional: What You Need to Know

3
Comments
3 min read
Why Data Security is Broken and How to Fix it?

Why Data Security is Broken and How to Fix it?

1
Comments
5 min read
Why Prioritizing Cloud Security Best Practices is Critical in 2024

Why Prioritizing Cloud Security Best Practices is Critical in 2024

Comments
5 min read
Leverage IP Data for Dynamic User Access Management 🌐

Leverage IP Data for Dynamic User Access Management 🌐

36
Comments 1
4 min read
Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Comments
13 min read
loading...