DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is Single Sign-On and Why do organizations should use it?

What is Single Sign-On and Why do organizations should use it?

4
Comments 1
4 min read
AWS Pentesting: Flaws.cloud level 2

AWS Pentesting: Flaws.cloud level 2

Comments 1
3 min read
Setup HTTPS with NGINX and Certbot

Setup HTTPS with NGINX and Certbot

1
Comments
6 min read
Offensive Git Forensics: Flaws.cloud Level3

Offensive Git Forensics: Flaws.cloud Level3

Comments
9 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part two, configuring Keycloak as my Identity provider

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part two, configuring Keycloak as my Identity provider

2
Comments
5 min read
Potential path traversal vulnerability when using File class and its solution

Potential path traversal vulnerability when using File class and its solution

Comments
4 min read
Top open source security devtools you need to know about

Top open source security devtools you need to know about

17
Comments 3
3 min read
👨🏻‍💻Securing Your Web Applications from SQL Injection with SQLMap

👨🏻‍💻Securing Your Web Applications from SQL Injection with SQLMap

17
Comments 4
6 min read
An Overview of Kubernetes Security Projects at KubeCon Europe 2023

An Overview of Kubernetes Security Projects at KubeCon Europe 2023

5
Comments
7 min read
Secure Your Next.js Application: Essential Security Practices and Tools

Secure Your Next.js Application: Essential Security Practices and Tools

4
Comments
2 min read
🔒💡 Building a Password Generator Web Application with Flask: Secure Your Data! 🔐🚀

🔒💡 Building a Password Generator Web Application with Flask: Secure Your Data! 🔐🚀

Comments
3 min read
An Introduction to OAuth 2.0 with Node.js and Passport.js

An Introduction to OAuth 2.0 with Node.js and Passport.js

Comments
3 min read
The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

2
Comments
4 min read
Do you make these small mistakes with HTTP status code?

Do you make these small mistakes with HTTP status code?

2
Comments
5 min read
Understanding JWT-Based Authentication

Understanding JWT-Based Authentication

Comments
3 min read
Secure Deploys from GitHub with the AWS CDK

Secure Deploys from GitHub with the AWS CDK

1
Comments
5 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

12
Comments
6 min read
How to discover the user’s IP address using Telegram.

How to discover the user’s IP address using Telegram.

9
Comments
4 min read
Como descobrir o endereço IP do usuário usando Telegram.

Como descobrir o endereço IP do usuário usando Telegram.

4
Comments
4 min read
How I saw too much information coming back from a company’s backend

How I saw too much information coming back from a company’s backend

2
Comments
11 min read
Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

6
Comments
3 min read
What is a IAM Principal?

What is a IAM Principal?

9
Comments 1
6 min read
Build Custom Authentication Using Appsmith and APISIX

Build Custom Authentication Using Appsmith and APISIX

46
Comments
9 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

9
Comments
15 min read
Best Practices for Staying Safe on Public Wi-Fi Networks

Best Practices for Staying Safe on Public Wi-Fi Networks

3
Comments
4 min read
AWS IAM: Allowing a Role to Assume Another Role

AWS IAM: Allowing a Role to Assume Another Role

Comments
2 min read
Spring security in a nutshell

Spring security in a nutshell

1
Comments
5 min read
Understanding Role-Based Access Control with ASP.NET Web APIs

Understanding Role-Based Access Control with ASP.NET Web APIs

11
Comments
3 min read
Security headers - what they are and how to use them 🔒

Security headers - what they are and how to use them 🔒

2
Comments
3 min read
DevOps vs DevSecOps: The Debate

DevOps vs DevSecOps: The Debate

3
Comments
10 min read
Credentials Leak with Knex

Credentials Leak with Knex

2
Comments
7 min read
Cross-Origin-Resource-Sharing (CORS): Explanation and how to handle it?

Cross-Origin-Resource-Sharing (CORS): Explanation and how to handle it?

Comments
10 min read
Understanding Eventual Consistency

Understanding Eventual Consistency

4
Comments
3 min read
Ethernaut - Lvl 7: Force

Ethernaut - Lvl 7: Force

Comments
2 min read
Dynamic Permissions in React using CASL: A Guide to Secure Your App🔒

Dynamic Permissions in React using CASL: A Guide to Secure Your App🔒

7
Comments
3 min read
4 Security Risks That Make Your Unsecured Lambda Functions Vulnerable

4 Security Risks That Make Your Unsecured Lambda Functions Vulnerable

2
Comments 2
5 min read
Ethernaut - Lvl 6: Delegation

Ethernaut - Lvl 6: Delegation

Comments
4 min read
Malware - Free Followers

Malware - Free Followers

5
Comments 1
3 min read
Securing Your Data Lake with Apache Atlas: The Ultimate Guide

Securing Your Data Lake with Apache Atlas: The Ultimate Guide

2
Comments
13 min read
What the heck is SSH?

What the heck is SSH?

5
Comments
6 min read
Thoughts on How to Prevent NoSQL Injection for Node.js Express Server

Thoughts on How to Prevent NoSQL Injection for Node.js Express Server

Comments
4 min read
Using HTTP Strict Transport Security (HSTS) headers in Node.js server

Using HTTP Strict Transport Security (HSTS) headers in Node.js server

1
Comments
3 min read
What is Provisioning and how does it work?

What is Provisioning and how does it work?

3
Comments
2 min read
Securing Your Next.js Application with Strict CSP

Securing Your Next.js Application with Strict CSP

9
Comments 3
3 min read
How should we keep our logs?

How should we keep our logs?

Comments
6 min read
How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty

How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty

8
Comments
4 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
JWT Authentication in ASP.NET

JWT Authentication in ASP.NET

5
Comments
11 min read
[HUGO]: How to use variables from .env

[HUGO]: How to use variables from .env

1
Comments
1 min read
3 Reasons Why Security is Key When Writing AWS Lambda Functions

3 Reasons Why Security is Key When Writing AWS Lambda Functions

3
Comments
2 min read
Boas Práticas em Criptografia de Dados 🔐

Boas Práticas em Criptografia de Dados 🔐

1
Comments
6 min read
Vault for Beginners

Vault for Beginners

5
Comments
4 min read
Join the 1Password Hackathon hosted by Hashnode and compete for $10,000 in prizes

Join the 1Password Hackathon hosted by Hashnode and compete for $10,000 in prizes

10
Comments
4 min read
Passwords Are Bad UX

Passwords Are Bad UX

3
Comments 1
2 min read
Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

2
Comments
5 min read
Code Smell 215 - Deserializing Object Vulnerability

Code Smell 215 - Deserializing Object Vulnerability

1
Comments
2 min read
Securing Your Home Network: 9 Very Simple Steps To Help Prevent Unauthorized Access

Securing Your Home Network: 9 Very Simple Steps To Help Prevent Unauthorized Access

2
Comments
3 min read
Compose and Send a Secure Message in Minutes with DataMotion APIs

Compose and Send a Secure Message in Minutes with DataMotion APIs

1
Comments
3 min read
Ethernaut - Lvl 4: Telephone

Ethernaut - Lvl 4: Telephone

Comments
3 min read
4 Essential Security Tools To Level Up Your Rails Security

4 Essential Security Tools To Level Up Your Rails Security

4
Comments
8 min read
loading...