DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
NPM Security Attacks

NPM Security Attacks

Comments
2 min read
7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

2
Comments
3 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

21
Comments 2
17 min read
Docker Container Security - Practices to Consider

Docker Container Security - Practices to Consider

1
Comments
4 min read
Exploring Cross-Site Scripting with React and Tauri

Exploring Cross-Site Scripting with React and Tauri

5
Comments
5 min read
Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

5
Comments
4 min read
An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

3
Comments 1
3 min read
Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

20
Comments 18
4 min read
Size Matters

Size Matters

7
Comments
4 min read
OpenSSL generating self-signed certificates - part 2

OpenSSL generating self-signed certificates - part 2

3
Comments
2 min read
Implementing Apple's Device Check App Attest Protocol

Implementing Apple's Device Check App Attest Protocol

40
Comments
8 min read
OpenSSL verify Private Key and Certificate Match - part 3

OpenSSL verify Private Key and Certificate Match - part 3

8
Comments
1 min read
3 Common API Security Testing Misconceptions

3 Common API Security Testing Misconceptions

Comments
4 min read
From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

19
Comments 3
18 min read
PHP 8.2: the SensitiveParameter attribute

PHP 8.2: the SensitiveParameter attribute

16
Comments 1
1 min read
Exploring Ethereum Wallets: A Comprehensive Guide

Exploring Ethereum Wallets: A Comprehensive Guide

20
Comments 3
13 min read
Techno Security & Digital Forensics Conference East 2023

Techno Security & Digital Forensics Conference East 2023

4
Comments
10 min read
Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

2
Comments
7 min read
How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

1
Comments
9 min read
Certificações gratuitas para cibersegurança

Certificações gratuitas para cibersegurança

1
Comments
2 min read
How to use JWT authentication with Iris

How to use JWT authentication with Iris

Comments
8 min read
Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

7
Comments
3 min read
Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

1
Comments
5 min read
Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

4
Comments
14 min read
loading...