DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
[picoctf]Binary Search writeup

[picoctf]Binary Search writeup

13
Comments
1 min read
[picoctf] Scan Surprise writeup

[picoctf] Scan Surprise writeup

2
Comments
1 min read
Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

9
Comments
3 min read
Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Comments
1 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
Security news weekly round-up - 9th August 2024

Security news weekly round-up - 9th August 2024

Comments
5 min read
Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

57
Comments
6 min read
An introduction to Postgres Row Level Security (RLS)

An introduction to Postgres Row Level Security (RLS)

6
Comments
2 min read
Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

2
Comments
4 min read
Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

7
Comments
2 min read
Commentary on CrowdStrike BSOD Root Cause Analysis Release

Commentary on CrowdStrike BSOD Root Cause Analysis Release

Comments
1 min read
Common Issues and Resolutions When Setting Up a VPC in AWS

Common Issues and Resolutions When Setting Up a VPC in AWS

Comments
3 min read
High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

5
Comments
5 min read
Issue 57 & 58 of AWS Cloud Security Weekly

Issue 57 & 58 of AWS Cloud Security Weekly

1
Comments 1
2 min read
Building an Authentication System with MERN

Building an Authentication System with MERN

1
Comments
4 min read
Simple and Easy-to-Use Web Security Gateway

Simple and Easy-to-Use Web Security Gateway

5
Comments
2 min read
Achieving Sustainable Development Goals through Green Building Standards

Achieving Sustainable Development Goals through Green Building Standards

3
Comments
4 min read
How we use Kubernetes jobs to scale OpenSSF Scorecard

How we use Kubernetes jobs to scale OpenSSF Scorecard

12
Comments
7 min read
Understanding Linux Permissions

Understanding Linux Permissions

17
Comments
2 min read
Securing the Cloud #32

Securing the Cloud #32

Comments
5 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Cryptography #0 - Essential Concepts

Cryptography #0 - Essential Concepts

5
Comments
7 min read
Introducing OpenSSF Scorecard for OpenSauced

Introducing OpenSSF Scorecard for OpenSauced

15
Comments 1
5 min read
Secure Data and Safeguard Users an App With End-to-End Encryption

Secure Data and Safeguard Users an App With End-to-End Encryption

Comments
9 min read
Is magic link sign-in dying? A closer look at its declining popularity

Is magic link sign-in dying? A closer look at its declining popularity

22
Comments 2
3 min read
Day 8: Mastering Bash Scripting in DevOps

Day 8: Mastering Bash Scripting in DevOps

3
Comments
2 min read
Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

2
Comments 1
9 min read
Protect Sensitive Pages With Nginx

Protect Sensitive Pages With Nginx

2
Comments
2 min read
What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
How to easily fix OpenSSH RegreSSHion vulnerability

How to easily fix OpenSSH RegreSSHion vulnerability

Comments
2 min read
How to test and secure a mail server in Debian and Ubuntu with ispmanager

How to test and secure a mail server in Debian and Ubuntu with ispmanager

6
Comments
10 min read
Why Python Is Good For Cybersecurity

Why Python Is Good For Cybersecurity

9
Comments 2
4 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Primera parte.

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Primera parte.

Comments
7 min read
Enhancing Data Security with AES Encryption in Java 🚀🔒

Enhancing Data Security with AES Encryption in Java 🚀🔒

Comments
2 min read
How To Stop Form Bots With Honeypot Fields

How To Stop Form Bots With Honeypot Fields

32
Comments 13
3 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 1

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 1

13
Comments
3 min read
Challenge with RBAC Authentication

Challenge with RBAC Authentication

2
Comments
2 min read
How to provision an AWS WAF using AWS CDK

How to provision an AWS WAF using AWS CDK

2
Comments
4 min read
CAPTCHA: Security Theater or AI Training Tool?

CAPTCHA: Security Theater or AI Training Tool?

Comments
4 min read
Docker Images for Go (Golang) Small, Faster Docker Images and Security

Docker Images for Go (Golang) Small, Faster Docker Images and Security

30
Comments 1
4 min read
Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)

Simulating a Privelege Escalation attack to Test Your Sentinel and Defender Setup (Final)

Comments
2 min read
Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)

Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)

Comments
3 min read
Enhancing Your Microsoft Sentinel Environment with Content Hub Solution (Part 2)

Enhancing Your Microsoft Sentinel Environment with Content Hub Solution (Part 2)

Comments
3 min read
Configuring a Microsoft Sentinel Environment (Part 1)

Configuring a Microsoft Sentinel Environment (Part 1)

Comments
2 min read
Managing NixOS Secrets via SOPS, sops-nix and opsops

Managing NixOS Secrets via SOPS, sops-nix and opsops

2
Comments
5 min read
How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide

How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide

2
Comments
3 min read
NPM packages leveraged for cryptocurrency theft

NPM packages leveraged for cryptocurrency theft

8
Comments
5 min read
What You ACTUALLY Need To Know For A Cybersecurity Job

What You ACTUALLY Need To Know For A Cybersecurity Job

31
Comments 4
4 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
SharePoint solutions as a spyware

SharePoint solutions as a spyware

1
Comments
6 min read
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Comments
4 min read
Automated ways to security audit your website

Automated ways to security audit your website

32
Comments 1
6 min read
Understanding SSL/TLS in Kubernetes

Understanding SSL/TLS in Kubernetes

1
Comments
3 min read
How private are your class #private fields?

How private are your class #private fields?

Comments
3 min read
From ground to production: Deploying Workload Identities on AKS

From ground to production: Deploying Workload Identities on AKS

3
Comments 1
8 min read
From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

Comments
5 min read
🛡️ Key cybersecurity threats in 2024: What should businesses know?

🛡️ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

3
Comments
2 min read
How to Keep Consumer Data Secure on Your E-Commerce Website

How to Keep Consumer Data Secure on Your E-Commerce Website

1
Comments
5 min read
loading...