DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

4
Comments
9 min read
Your S3 objects could be public (even though the AWS Console doesn't say so)

Your S3 objects could be public (even though the AWS Console doesn't say so)

5
Comments 1
5 min read
A tale of TimescaleDB, SQLx and testing in Rust

A tale of TimescaleDB, SQLx and testing in Rust

2
Comments 1
18 min read
Enhancing security for Lambda function URLs

Enhancing security for Lambda function URLs

2
Comments
6 min read
Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

3
Comments
5 min read
Scopes and Claims Explained

Scopes and Claims Explained

2
Comments
3 min read
HTTP Tools for Security Researchers and Pen Testers

HTTP Tools for Security Researchers and Pen Testers

6
Comments 4
3 min read
Optimise and Secure AWS HTTP API Gateway by locking down direct access

Optimise and Secure AWS HTTP API Gateway by locking down direct access

2
Comments
8 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

2
Comments
4 min read
Securing Self-Hosted Services with CF Tunnel Gate

Securing Self-Hosted Services with CF Tunnel Gate

Comments
5 min read
Warn And Log Out User Due To Inactivity In Angular App

Warn And Log Out User Due To Inactivity In Angular App

Comments
3 min read
How to restrict default access to KMS via key policy

How to restrict default access to KMS via key policy

2
Comments
3 min read
Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

6
Comments
4 min read
Using NetBird for Kubernetes Access

Using NetBird for Kubernetes Access

4
Comments
11 min read
SCaLE 21x: A Community Event About Much More Than Linux

SCaLE 21x: A Community Event About Much More Than Linux

1
Comments
12 min read
Shared Access Signature

Shared Access Signature

4
Comments
4 min read
Convert to workload identity federation

Convert to workload identity federation

Comments
2 min read
Interactive description of iptables tables

Interactive description of iptables tables

Comments
1 min read
AI Tools of the 21st Century: Humanoid Robots

AI Tools of the 21st Century: Humanoid Robots

4
Comments
1 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Comments
4 min read
keepsecret.py: a simple way to encrypt secret files in your repository

keepsecret.py: a simple way to encrypt secret files in your repository

3
Comments
4 min read
Process and data isolation strategies pt. 1 - Sandboxes and Process imprisonment

Process and data isolation strategies pt. 1 - Sandboxes and Process imprisonment

Comments
4 min read
How to get the verified badge on GitHub with SSH key signing

How to get the verified badge on GitHub with SSH key signing

2
Comments
1 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

1
Comments
11 min read
HackTheBox - Writeup Devvortex [Retired]

HackTheBox - Writeup Devvortex [Retired]

Comments
12 min read
How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

Comments
4 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
Why you should sign your commits, and not only how.

Why you should sign your commits, and not only how.

7
Comments
3 min read
Security news weekly round-up - 26th April 2024

Security news weekly round-up - 26th April 2024

2
Comments
3 min read
PostgreSQL. How to check connections that are not using SSL encryption?

PostgreSQL. How to check connections that are not using SSL encryption?

2
Comments
2 min read
How Do Free Apps Make Money?

How Do Free Apps Make Money?

5
Comments
5 min read
Enhancing Customer Workloads

Enhancing Customer Workloads

Comments
4 min read
Creating Passkey Authentication in a Rails 7 Application

Creating Passkey Authentication in a Rails 7 Application

1
Comments
4 min read
DynamoDB now supports resource-based policies. But is that a good idea?

DynamoDB now supports resource-based policies. But is that a good idea?

Comments
5 min read
What Kills Your Flash Drive and How You Can Avoid It?

What Kills Your Flash Drive and How You Can Avoid It?

1
Comments
3 min read
Best Practices for API Authentication and Authorization

Best Practices for API Authentication and Authorization

1
Comments
8 min read
Secrets in Lambda Env Vars

Secrets in Lambda Env Vars

6
Comments
3 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

3
Comments
11 min read
For developers: you must not require needs passwords from users

For developers: you must not require needs passwords from users

15
Comments 22
4 min read
Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Comments
6 min read
Llavero Wallet: My Vault

Llavero Wallet: My Vault

3
Comments 1
4 min read
Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Comments
3 min read
The Open-Source Backdoor That Almost Compromised SSH

The Open-Source Backdoor That Almost Compromised SSH

2
Comments
3 min read
🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

🎭 XSS Exposed: The Good, the Bad, and the Ugly! 🧑‍💻

6
Comments
2 min read
Elevate Your DevOps and Cloud Engineering Journey

Elevate Your DevOps and Cloud Engineering Journey

Comments
4 min read
Create Certificate Authority with AWS Private CA SDK

Create Certificate Authority with AWS Private CA SDK

4
Comments
4 min read
pfSense basic firewall setup

pfSense basic firewall setup

Comments
1 min read
pfSense Quickstart

pfSense Quickstart

Comments
2 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

1
Comments
6 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
Security: Why the "XZ backdoor" is worrying

Security: Why the "XZ backdoor" is worrying

2
Comments 1
2 min read
AWS Guard Duty

AWS Guard Duty

4
Comments 2
3 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

5
Comments
5 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

5
Comments
5 min read
Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

3
Comments
3 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

2
Comments
6 min read
loading...