DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 11th October 2024

Security news weekly round-up - 11th October 2024

1
Comments
3 min read
Who is a Hacker?

Who is a Hacker?

7
Comments 1
8 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments 1
6 min read
Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

1
Comments
1 min read
The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments 5
3 min read
5 AI-Powered Content Detectors to Help Identify AI-Generated Text

5 AI-Powered Content Detectors to Help Identify AI-Generated Text

4
Comments 2
5 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

1
Comments
2 min read
How to optimize BitNinja for weak servers

How to optimize BitNinja for weak servers

6
Comments
5 min read
Top 10 Tips with Code Examples: C# Application Security

Top 10 Tips with Code Examples: C# Application Security

14
Comments 1
8 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

2
Comments
3 min read
Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Comments
5 min read
What happens when a user tries to access a resource in AWS ?

What happens when a user tries to access a resource in AWS ?

Comments
1 min read
Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

1
Comments
7 min read
API7 Enterprise v3.2.16: Integrated Secret Providers

API7 Enterprise v3.2.16: Integrated Secret Providers

1
Comments
3 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

33
Comments 5
10 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

3
Comments 1
5 min read
Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Comments
4 min read
Dockerfile Best Practices: Writing Efficient and Secure Docker Images

Dockerfile Best Practices: Writing Efficient and Secure Docker Images

50
Comments 4
4 min read
BotKube: Integrando o agente de monitoramento com o Slack

BotKube: Integrando o agente de monitoramento com o Slack

4
Comments
2 min read
Create a self-signed certificate with your own root CA

Create a self-signed certificate with your own root CA

3
Comments
2 min read
Implementación de Autenticación Segura en Node.js con JWT

Implementación de Autenticación Segura en Node.js con JWT

2
Comments
4 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

1
Comments
4 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
E-commerce website vulnerability bounty practice sharing(I)

E-commerce website vulnerability bounty practice sharing(I)

Comments
2 min read
loading...