DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Zero Trust Security: Beyond the Castle Walls

Zero Trust Security: Beyond the Castle Walls

12
Comments
11 min read
What is DevSecOps? A Comprehensive Look at DevSecOps

What is DevSecOps? A Comprehensive Look at DevSecOps

100
Comments 4
12 min read
Remotely Access Your Home Assistant Instance Securely

Remotely Access Your Home Assistant Instance Securely

Comments
6 min read
Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

4
Comments 1
1 min read
Use non-root user in scratch docker image

Use non-root user in scratch docker image

1
Comments
1 min read
Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Comments
4 min read
ScoutSuite

ScoutSuite

1
Comments
2 min read
Authentication in monorepo(NextJs, Astro) with Lucia and MongoDB

Authentication in monorepo(NextJs, Astro) with Lucia and MongoDB

1
Comments
12 min read
Securing File Uploads

Securing File Uploads

Comments
5 min read
Implementing Role Based Access Control (RBAC) in Node.js and Express App

Implementing Role Based Access Control (RBAC) in Node.js and Express App

21
Comments
10 min read
Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Comments
8 min read
Enhanced Container Isolation(ECI) vs. Rootless Docker: Securing Your Docker Desktop Workflows

Enhanced Container Isolation(ECI) vs. Rootless Docker: Securing Your Docker Desktop Workflows

Comments
3 min read
Be a Part of OWASP Top 10 2024!

Be a Part of OWASP Top 10 2024!

5
Comments 3
4 min read
New domain OSINT tool. Your thoughts and feedback?

New domain OSINT tool. Your thoughts and feedback?

Comments
1 min read
Cloud-Native Security: A Guide to Microservices and Serverless Protection

Cloud-Native Security: A Guide to Microservices and Serverless Protection

16
Comments 1
11 min read
Understanding OTP SMS Bombing

Understanding OTP SMS Bombing

4
Comments
2 min read
Death of DevSecOps, Part 2

Death of DevSecOps, Part 2

3
Comments
4 min read
Enhancing Security in Web Applications with Custom Response Headers in Next.js

Enhancing Security in Web Applications with Custom Response Headers in Next.js

3
Comments 1
2 min read
Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Code Integrity Unleashed: The Crucial Role of Git Signed Commits

Code Integrity Unleashed: The Crucial Role of Git Signed Commits

1
Comments
1 min read
Interoperability for Seamless Integration of Blockchain Networks

Interoperability for Seamless Integration of Blockchain Networks

1
Comments
4 min read
Amazon Inspector

Amazon Inspector

5
Comments
3 min read
AWS Athena for GitHub - Eliminating the default Security blind spots

AWS Athena for GitHub - Eliminating the default Security blind spots

5
Comments
10 min read
OpenID Connect Flows: From Implicit to Authorization Code with PKCE & BFF

OpenID Connect Flows: From Implicit to Authorization Code with PKCE & BFF

1
Comments
30 min read
Social engineering

Social engineering

26
Comments
10 min read
OpenSSF Case Study: Enhancing Open Source Security with Sigstore at Stacklok

OpenSSF Case Study: Enhancing Open Source Security with Sigstore at Stacklok

3
Comments
1 min read
Access Google Cloud Secret Manager via Google Apps Script

Access Google Cloud Secret Manager via Google Apps Script

Comments
2 min read
User Authorization with Postgres Row Level Security Policy

User Authorization with Postgres Row Level Security Policy

1
Comments 1
2 min read
JS Security Tip 05-01-2024 ICYMI

JS Security Tip 05-01-2024 ICYMI

Comments
1 min read
Building a Bulletproof CI/CD Pipeline: A Comprehensive Guide

Building a Bulletproof CI/CD Pipeline: A Comprehensive Guide

353
Comments 18
14 min read
Java URI Library Compliant with RFC 3986

Java URI Library Compliant with RFC 3986

1
Comments
9 min read
Nearly Offline Revocation Status Checks for JWT

Nearly Offline Revocation Status Checks for JWT

2
Comments
2 min read
Implementing AWS Config for your Organization with CloudFormation

Implementing AWS Config for your Organization with CloudFormation

4
Comments
13 min read
📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

1
Comments
4 min read
Step by Step Troubleshooting WAFv2 - With Pictures

Step by Step Troubleshooting WAFv2 - With Pictures

5
Comments
4 min read
The Future of Bug Logging and Internet Security

The Future of Bug Logging and Internet Security

7
Comments
3 min read
Azure PostgreSQL, Entra ID Authentication and .NET

Azure PostgreSQL, Entra ID Authentication and .NET

9
Comments
8 min read
AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

2
Comments
15 min read
Flutter: Best Practices for API Key Security ✅

Flutter: Best Practices for API Key Security ✅

21
Comments
5 min read
Issue 42 of AWS Cloud Security Weekly

Issue 42 of AWS Cloud Security Weekly

2
Comments
2 min read
重置 Linux root 密碼

重置 Linux root 密碼

Comments
1 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

1
Comments
15 min read
JavaScript Security: Simple Practices to Secure Your Frontend

JavaScript Security: Simple Practices to Secure Your Frontend

298
Comments 20
3 min read
Rebuilding TensorFlow 2.8.4 on Ubuntu 22.04 to patch vulnerabilities

Rebuilding TensorFlow 2.8.4 on Ubuntu 22.04 to patch vulnerabilities

2
Comments
7 min read
Advanced CI/CD Pipeline Configuration Strategies

Advanced CI/CD Pipeline Configuration Strategies

140
Comments 13
9 min read
** Autenticación en Aplicaciones Web: Explicado al estilo de Beavis & Butthead **🔐

** Autenticación en Aplicaciones Web: Explicado al estilo de Beavis & Butthead **🔐

Comments
8 min read
Data Encryption

Data Encryption

1
Comments
2 min read
How to secure a WordPress site: auditing and monitoring tools

How to secure a WordPress site: auditing and monitoring tools

9
Comments
8 min read
Upstream preview: Life after the xz utils backdoor hack

Upstream preview: Life after the xz utils backdoor hack

Comments
3 min read
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Implementing Role Based Access Control in SvelteKit

Implementing Role Based Access Control in SvelteKit

28
Comments
12 min read
Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Comments
2 min read
Public IP Over VPN in Azure

Public IP Over VPN in Azure

Comments
5 min read
Row Level Security In SQL Server

Row Level Security In SQL Server

Comments
3 min read
Dotenvx with Docker, the better way to manage project environment variables with secrets

Dotenvx with Docker, the better way to manage project environment variables with secrets

4
Comments
8 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

1
Comments
10 min read
Security Protocol to connect AWS SES

Security Protocol to connect AWS SES

Comments
3 min read
Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

Comments
3 min read
What is AWS Identity and Access Management (IAM)?

What is AWS Identity and Access Management (IAM)?

Comments
7 min read
loading...