DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 19th April 2024

Security news weekly round-up - 19th April 2024

Comments
2 min read
Data Security and Cryptography on AWS

Data Security and Cryptography on AWS

Comments
3 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Comments
13 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
eBPF: Unleashing Kernel Magic for Modern Infrastructure

eBPF: Unleashing Kernel Magic for Modern Infrastructure

2
Comments 1
5 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

1
Comments
4 min read
Enhance Security for NodeJS Applications

Enhance Security for NodeJS Applications

Comments
5 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 6
4 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
AWS Detective

AWS Detective

Comments
2 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
keepsecret.py: a simple way to encrypt secret files in your repository

keepsecret.py: a simple way to encrypt secret files in your repository

1
Comments
4 min read
For developers: you must not require needs passwords from users

For developers: you must not require needs passwords from users

14
Comments 21
4 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
Enhancing AWS Monitoring for Improved Threat Management

Enhancing AWS Monitoring for Improved Threat Management

Comments
2 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
How to implement JWT in Laravel API

How to implement JWT in Laravel API

3
Comments
4 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

2
Comments
5 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
Your S3 objects could be public (even though the AWS Console doesn't say so)

Your S3 objects could be public (even though the AWS Console doesn't say so)

3
Comments 1
5 min read
Gerenciando informações e eventos de segurança - SIEM

Gerenciando informações e eventos de segurança - SIEM

1
Comments
3 min read
Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

2
Comments
5 min read
Locally test and validate your Renovate configuration files

Locally test and validate your Renovate configuration files

Comments
3 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

6
Comments
2 min read
Securing Self-Hosted Services with CF Tunnel Gate

Securing Self-Hosted Services with CF Tunnel Gate

Comments
5 min read
Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Comments
5 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Infrastructure protection on AWS for Beginners

Infrastructure protection on AWS for Beginners

Comments
7 min read
Security news weekly round-up - 5th April 2024

Security news weekly round-up - 5th April 2024

1
Comments
3 min read
AI Tools of the 21st Century: Humanoid Robots

AI Tools of the 21st Century: Humanoid Robots

2
Comments
1 min read
🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

Comments
2 min read
GitHub: signing commit in a workflow

GitHub: signing commit in a workflow

2
Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
Fortress GitHub: Building a Secure Organization

Fortress GitHub: Building a Secure Organization

Comments
6 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
API Security Best Practices: Enable Good Governance

API Security Best Practices: Enable Good Governance

Comments
6 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Comments
2 min read
How to know if you have the XZ vulnerability and what you can do about it

How to know if you have the XZ vulnerability and what you can do about it

Comments
2 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

2
Comments
11 min read
Social media authentication: convenience vs privacy

Social media authentication: convenience vs privacy

1
Comments
5 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
The Open-Source Backdoor That Almost Compromised SSH

The Open-Source Backdoor That Almost Compromised SSH

1
Comments
3 min read
Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

1
Comments
2 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
What are passkeys and how do they work?

What are passkeys and how do they work?

22
Comments 3
6 min read
loading...