DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
pfSense basic firewall setup

pfSense basic firewall setup

Comments
1 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

1
Comments
6 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
Security: Why the "XZ backdoor" is worrying

Security: Why the "XZ backdoor" is worrying

2
Comments 1
2 min read
AWS Guard Duty

AWS Guard Duty

4
Comments 2
3 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

5
Comments
5 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

5
Comments
5 min read
Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

3
Comments
3 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

2
Comments
6 min read
Password Management: The Basics

Password Management: The Basics

11
Comments 9
10 min read
The XZ attack and timeline

The XZ attack and timeline

25
Comments 3
6 min read
Cors Workflow

Cors Workflow

1
Comments
2 min read
Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

6
Comments
2 min read
Compliant infrastructure using infrastructure as code

Compliant infrastructure using infrastructure as code

2
Comments
6 min read
Content Delivery Network Explained 🌎⚡️

Content Delivery Network Explained 🌎⚡️

3
Comments
4 min read
Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

6
Comments
2 min read
10 Ways To Ensure Successful Mobile App Security

10 Ways To Ensure Successful Mobile App Security

1
Comments
4 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

37
Comments 1
6 min read
Ngrok: Exposing local server on the internet

Ngrok: Exposing local server on the internet

Comments
3 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

7
Comments 1
2 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 7
4 min read
Securing the Cloud #27

Securing the Cloud #27

Comments
2 min read
Security news weekly round-up - 19th April 2024

Security news weekly round-up - 19th April 2024

Comments
2 min read
GenAI Series: Protegiendo tus modelos de IA

GenAI Series: Protegiendo tus modelos de IA

6
Comments
5 min read
A rant on data breaches

A rant on data breaches

Comments
2 min read
Data Security and Cryptography on AWS

Data Security and Cryptography on AWS

Comments
3 min read
Security : CVE-2024-3094 unauthorized remote SSH access

Security : CVE-2024-3094 unauthorized remote SSH access

3
Comments
2 min read
Security Enhancements in React Native Apps

Security Enhancements in React Native Apps

23
Comments
3 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Migrating to Chainguard Images: less CVEs for safer container runtimes

Migrating to Chainguard Images: less CVEs for safer container runtimes

10
Comments 1
3 min read
Observability and Security with AWS

Observability and Security with AWS

Comments
4 min read
Solving AWS Network Puzzles with Mathematics - Part 1

Solving AWS Network Puzzles with Mathematics - Part 1

3
Comments
7 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
US government warns against C and C++ code

US government warns against C and C++ code

5
Comments
4 min read
GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

Comments
5 min read
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

2
Comments 1
10 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
Loop DOS? Letś Discuss.

Loop DOS? Letś Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
Mastering JWT Security

Mastering JWT Security

91
Comments 18
3 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

9
Comments
11 min read
Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Comments
2 min read
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
Are hackers watching your screen right now?

Are hackers watching your screen right now?

18
Comments 1
3 min read
How is Amazon Web Services ensuring AI is Securely handling Our Data?

How is Amazon Web Services ensuring AI is Securely handling Our Data?

1
Comments
5 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
6 security advancements that Plang offers for the user

6 security advancements that Plang offers for the user

Comments
2 min read
Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Comments
5 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Better Threat Detection with CloudWatch Logs and Generative AI

Better Threat Detection with CloudWatch Logs and Generative AI

1
Comments
6 min read
Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images

7
Comments
7 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
loading...