DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

1
Comments 1
4 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
3G Cell Service Has a HUGE Security Flaw.

3G Cell Service Has a HUGE Security Flaw.

21
Comments 9
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

14
Comments 1
1 min read
Building a Password Manager in Go: Part 2

Building a Password Manager in Go: Part 2

10
Comments 1
3 min read
Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

1
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
Issue 63 of AWS Cloud Security Weekly

Issue 63 of AWS Cloud Security Weekly

4
Comments
3 min read
From legacy to cloud serverless - Part 4

From legacy to cloud serverless - Part 4

Comments
7 min read
Enhance DigitalOcean with AWS-Level SSM and SSO Features

Enhance DigitalOcean with AWS-Level SSM and SSO Features

Comments
4 min read
Network Automization using AI.

Network Automization using AI.

Comments
6 min read
HIPAA Compliance Checklist For Healthcare Startups

HIPAA Compliance Checklist For Healthcare Startups

Comments
7 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
How to publish custom cdk-nag rules and rule packs with Projen

How to publish custom cdk-nag rules and rule packs with Projen

7
Comments
6 min read
Malware: Detection, Collection, and Analysis

Malware: Detection, Collection, and Analysis

2
Comments 2
3 min read
Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

1
Comments
6 min read
Security and Data Protection in Crypto Exchange Mining Pools

Security and Data Protection in Crypto Exchange Mining Pools

Comments
2 min read
Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

7
Comments 1
6 min read
Proxmox and NAS: Implementing VLANs for Network Isolation

Proxmox and NAS: Implementing VLANs for Network Isolation

2
Comments
4 min read
Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

1
Comments
3 min read
Is Authentication Just About What The Server And Client Know And Don't Know?

Is Authentication Just About What The Server And Client Know And Don't Know?

Comments
2 min read
Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

2
Comments
16 min read
loading...