DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

2
Comments
7 min read
Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

Comments
3 min read
Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

1
Comments
5 min read
Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

4
Comments
14 min read
Fast guide, creating a ssh key pair for the user in Linux

Fast guide, creating a ssh key pair for the user in Linux

2
Comments
1 min read
Demystifying Public Key Cryptography: Exploring Ethereum, Digital Signatures, and Wallet Management

Demystifying Public Key Cryptography: Exploring Ethereum, Digital Signatures, and Wallet Management

21
Comments 1
15 min read
What's new in the CIS v2.0 benchmark for AWS

What's new in the CIS v2.0 benchmark for AWS

4
Comments 1
3 min read
Exploring Test Automation in Cybersecurity Penetration Testing

Exploring Test Automation in Cybersecurity Penetration Testing

1
Comments 2
3 min read
Laravel Validation: Tips and Tricks for Building Secure Applications

Laravel Validation: Tips and Tricks for Building Secure Applications

1
Comments
1 min read
Database and Scaling : Backend Development [Part 2/2]

Database and Scaling : Backend Development [Part 2/2]

1
Comments
8 min read
My Wedding Guestbook

My Wedding Guestbook

1
Comments 3
1 min read
Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

1
Comments
3 min read
The Final Mile

The Final Mile

9
Comments
2 min read
Encrypting objects with dual-layer server-side encryption using Lambda functions

Encrypting objects with dual-layer server-side encryption using Lambda functions

3
Comments
5 min read
Why Metasploit ?!

Why Metasploit ?!

5
Comments
2 min read
8 Must-Have Infrastructure Reconnaissance Tools for Your App Security

8 Must-Have Infrastructure Reconnaissance Tools for Your App Security

Comments
2 min read
Jump-Box EC2 101: Unlocking Secure Access to Private Resources

Jump-Box EC2 101: Unlocking Secure Access to Private Resources

3
Comments
4 min read
Container Security - Strengthening the Heart of your Operations

Container Security - Strengthening the Heart of your Operations

2
Comments 2
4 min read
Denylists and Invaliding user access

Denylists and Invaliding user access

12
Comments 2
11 min read
10 Dicas Basicas de Arquitetura de Código : 3 - Cuidado com o que você armazena no seu código

10 Dicas Basicas de Arquitetura de Código : 3 - Cuidado com o que você armazena no seu código

1
Comments
3 min read
Interview with Greg Molnar - Rails developer and penetration tester

Interview with Greg Molnar - Rails developer and penetration tester

4
Comments
7 min read
CrabNebula: A New Star Forge Emerges

CrabNebula: A New Star Forge Emerges

5
Comments
4 min read
Linux Permissions Unraveled: How to Avoid ‘chmod 777’ and Keep the Chaos at Bay!

Linux Permissions Unraveled: How to Avoid ‘chmod 777’ and Keep the Chaos at Bay!

1
Comments
5 min read
Passwordless Authentication: The Key to Preventing Credential Stuffing

Passwordless Authentication: The Key to Preventing Credential Stuffing

Comments
4 min read
Generating SSH key – the best way

Generating SSH key – the best way

Comments
2 min read
Secrets and Environment Variables in your GitHub Action

Secrets and Environment Variables in your GitHub Action

12
Comments 1
3 min read
10 steps to secure your Laravel Application

10 steps to secure your Laravel Application

Comments 1
2 min read
Building Secure Docker Images for Production - Best Practices

Building Secure Docker Images for Production - Best Practices

23
Comments 4
7 min read
php[tek] 2023 - A Community Of Communities Powering The Internet

php[tek] 2023 - A Community Of Communities Powering The Internet

2
Comments
9 min read
GitHub Pages: Custom Domains and SSL

GitHub Pages: Custom Domains and SSL

Comments
4 min read
ChatGPT at Work: How to block Content Leaks 🔒

ChatGPT at Work: How to block Content Leaks 🔒

3
Comments
2 min read
Docker Secrets Best Practices: Protecting Sensitive Information in Containers

Docker Secrets Best Practices: Protecting Sensitive Information in Containers

12
Comments 2
6 min read
Updating Security Groups in AWS ECS on Fargate

Updating Security Groups in AWS ECS on Fargate

1
Comments
2 min read
Overview of Pentesting Phases

Overview of Pentesting Phases

4
Comments
2 min read
Information Gathering

Information Gathering

3
Comments
2 min read
Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

1
Comments
4 min read
Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Comments
3 min read
Unveiling the Power of AI in Software Security at DevSecCon

Unveiling the Power of AI in Software Security at DevSecCon

2
Comments 1
3 min read
Serve your hash with Salt and Pepper for Stronger Account Security

Serve your hash with Salt and Pepper for Stronger Account Security

1
Comments
6 min read
Simplify Password Management with the 'pass' Command-Line Password Manager

Simplify Password Management with the 'pass' Command-Line Password Manager

10
Comments 2
2 min read
Securely Storing API Keys in Flutter

Securely Storing API Keys in Flutter

3
Comments 1
2 min read
A Comprehensive Guide to Cookies and Sessions in Web Development with Python

A Comprehensive Guide to Cookies and Sessions in Web Development with Python

1
Comments
4 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

Comments
3 min read
Phishing Attacks Explained: Protecting Yourself from Online Scams

Phishing Attacks Explained: Protecting Yourself from Online Scams

1
Comments
3 min read
Remotely Connect to Your Instances without a Public IP Address

Remotely Connect to Your Instances without a Public IP Address

3
Comments 4
3 min read
Gerenciando SD Elements com o Jira

Gerenciando SD Elements com o Jira

2
Comments
1 min read
Understanding Security Vulnerabilities: A First Step in Preventing Attacks

Understanding Security Vulnerabilities: A First Step in Preventing Attacks

10
Comments
8 min read
How to Detect and Fix Kubernetes Misconfigurations

How to Detect and Fix Kubernetes Misconfigurations

2
Comments
5 min read
Flex your muscles 🧠💪

Flex your muscles 🧠💪

1
Comments
2 min read
Hello spiderfoot

Hello spiderfoot

Comments
1 min read
Will passkeys kill password managers?

Will passkeys kill password managers?

3
Comments 2
2 min read
Understanding Authorization Before Authentication: Enhancing Web API Security

Understanding Authorization Before Authentication: Enhancing Web API Security

34
Comments
4 min read
Amazon Verified Permissions

Amazon Verified Permissions

Comments
2 min read
How does JWT work?

How does JWT work?

6
Comments
1 min read
SSL para SaaS com multiplos domínios usando Docker e Caddy

SSL para SaaS com multiplos domínios usando Docker e Caddy

3
Comments
2 min read
Easy way to Solve Captcha Using JavaScript & 2Captcha

Easy way to Solve Captcha Using JavaScript & 2Captcha

3
Comments 2
6 min read
Revolutionize authentication through the 1Password Hackathon

Revolutionize authentication through the 1Password Hackathon

9
Comments
4 min read
Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Comments
5 min read
Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Comments
3 min read
loading...