DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
[Python] Tool Hacking Plus

[Python] Tool Hacking Plus

Comments
1 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
OWASP Dependency Check in Node js 🛡️

OWASP Dependency Check in Node js 🛡️

7
Comments
1 min read
Creating your own security attribute with Symfony

Creating your own security attribute with Symfony

3
Comments
2 min read
Memo to pass AWS Certified Security Specialty(SCS-C02)

Memo to pass AWS Certified Security Specialty(SCS-C02)

3
Comments
1 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
Security news weekly round-up - 28th June 2024

Security news weekly round-up - 28th June 2024

2
Comments
3 min read
Understanding and Preventing XSS Attacks in C# Applications

Understanding and Preventing XSS Attacks in C# Applications

3
Comments
2 min read
Protecting User Data: Encryption and Secure Storage in Frontend

Protecting User Data: Encryption and Secure Storage in Frontend

4
Comments
7 min read
Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
Leveraging Environment Variables in Next.js for Secure Data Access

Leveraging Environment Variables in Next.js for Secure Data Access

2
Comments
2 min read
Why single sign-on (SSO) is better

Why single sign-on (SSO) is better

25
Comments 1
5 min read
The End of X (Or, It Should Be): How Elon Killed Twitter

The End of X (Or, It Should Be): How Elon Killed Twitter

45
Comments 31
10 min read
BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

Comments
6 min read
Using ModSecurity in Nginx project — maintaining protection on WordPress

Using ModSecurity in Nginx project — maintaining protection on WordPress

8
Comments
8 min read
Cybersecurity in the Age of Digital Transformation

Cybersecurity in the Age of Digital Transformation

5
Comments
2 min read
Serverless on GCP using Cloud Functions

Serverless on GCP using Cloud Functions

2
Comments 2
1 min read
Webhook Security Approaches

Webhook Security Approaches

8
Comments
3 min read
Drupal Access Policy demystified

Drupal Access Policy demystified

4
Comments 3
12 min read
Amazon GuardDuty Malware Protection for Amazon S3

Amazon GuardDuty Malware Protection for Amazon S3

3
Comments
2 min read
Managing and Rotating Secrets with AWS Secrets Manager

Managing and Rotating Secrets with AWS Secrets Manager

13
Comments
4 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

4
Comments
10 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

52
Comments
9 min read
The Body Shop of Security: Biometrics

The Body Shop of Security: Biometrics

24
Comments
2 min read
Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Comments
2 min read
Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

28
Comments
2 min read
Nations attacking their own internet (to stop cheating on exams)

Nations attacking their own internet (to stop cheating on exams)

16
Comments
1 min read
Best Python Libraries for Cybersecurity in 2024

Best Python Libraries for Cybersecurity in 2024

14
Comments 8
13 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

291
Comments 1
10 min read
A primer on open-source intelligence for bug bounty hunting in Grafana

A primer on open-source intelligence for bug bounty hunting in Grafana

5
Comments
10 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

Comments
2 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

Comments 2
2 min read
Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

Comments
2 min read
Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

1
Comments
8 min read
OAuth 2.1 is Here: What You Need to Know

OAuth 2.1 is Here: What You Need to Know

17
Comments
6 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Using the Trusty API to discover deprecated and malicious packages.

Using the Trusty API to discover deprecated and malicious packages.

3
Comments
2 min read
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

15
Comments
2 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

4
Comments
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

6
Comments 1
3 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

2
Comments
2 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

6
Comments 2
4 min read
.NET 8.0 - Securing the API with JWT Bearer Token

.NET 8.0 - Securing the API with JWT Bearer Token

150
Comments 1
5 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

22
Comments 2
2 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

21
Comments 1
5 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

Comments
5 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

1
Comments
2 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
Integrating reCAPTCHA v3 in Next.js

Integrating reCAPTCHA v3 in Next.js

27
Comments 2
2 min read
Dev: Security

Dev: Security

Comments
3 min read
CodeBehind 2.7 Released, Role Access Added!

CodeBehind 2.7 Released, Role Access Added!

1
Comments
7 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Proposal - Blockchain Coordination

Proposal - Blockchain Coordination

Comments
5 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
loading...