DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Effectively Assess the Security of Your Apps

How to Effectively Assess the Security of Your Apps

6
Comments
5 min read
The Intersection of Data Science and Cybersecurity

The Intersection of Data Science and Cybersecurity

4
Comments
3 min read
HackTheBox - Writeup Editorial [Retired]

HackTheBox - Writeup Editorial [Retired]

Comments
12 min read
Custom Role-Based Access Control in NestJS Using Custom Guards

Custom Role-Based Access Control in NestJS Using Custom Guards

4
Comments
3 min read
Is Fail2ban Enough to Secure Your Linux Server?

Is Fail2ban Enough to Secure Your Linux Server?

Comments
3 min read
Protecting Your APIs: Understanding Authentication and Authorization

Protecting Your APIs: Understanding Authentication and Authorization

2
Comments
4 min read
How to use GitHub Personal Access Tokens Securely

How to use GitHub Personal Access Tokens Securely

13
Comments
6 min read
🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

2
Comments 2
3 min read
Securing Java Web Applications: Best Practices and Java EE Features

Securing Java Web Applications: Best Practices and Java EE Features

1
Comments
9 min read
Cómo Realizar y Detectar Ataques de Path Injection

Cómo Realizar y Detectar Ataques de Path Injection

Comments
6 min read
How to Securely Remove a File from Git History: A Step-by-Step Guide

How to Securely Remove a File from Git History: A Step-by-Step Guide

1
Comments
3 min read
Understanding Security Clearance for IT Jobs

Understanding Security Clearance for IT Jobs

13
Comments
3 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments
3 min read
Cloud Computing Security Best Practices for Enterprises

Cloud Computing Security Best Practices for Enterprises

Comments
7 min read
Managing Dependabot PRs with dependabot-pr-manager 🤖

Managing Dependabot PRs with dependabot-pr-manager 🤖

24
Comments 2
3 min read
Using SSH to Connect Local Git to Remote Repositories

Using SSH to Connect Local Git to Remote Repositories

11
Comments
6 min read
Reset password in uptime kuma

Reset password in uptime kuma

Comments
2 min read
The Anatomy of a Wi-Fi Attack: Uncovering the Cracks in WPA/WPA2 Security

The Anatomy of a Wi-Fi Attack: Uncovering the Cracks in WPA/WPA2 Security

Comments
4 min read
The Most Potent Security Control on AWS

The Most Potent Security Control on AWS

1
Comments
2 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

Comments
5 min read
From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

Comments
6 min read
KeyRunner: Not Just Another API Client-Your Secure Choice for API interactions in VSCode & Desktop!

KeyRunner: Not Just Another API Client-Your Secure Choice for API interactions in VSCode & Desktop!

Comments
1 min read
Why Data Security is Broken and How to Fix it?

Why Data Security is Broken and How to Fix it?

1
Comments
5 min read
Why Prioritizing Cloud Security Best Practices is Critical in 2024

Why Prioritizing Cloud Security Best Practices is Critical in 2024

Comments
5 min read
Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Comments
13 min read
How to Reset Your Local Git Branch

How to Reset Your Local Git Branch

Comments
5 min read
Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

Comments
5 min read
How to Discard Local Changes in Git

How to Discard Local Changes in Git

5
Comments
5 min read
How to Become a Firewall Administrator: A Comprehensive Guide

How to Become a Firewall Administrator: A Comprehensive Guide

Comments
9 min read
A Quick Look at the Problem of Data Poisoning in Language Models

A Quick Look at the Problem of Data Poisoning in Language Models

Comments
2 min read
Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Comments
5 min read
Encryption Symmetric

Encryption Symmetric

Comments
3 min read
Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Comments
5 min read
Backpack - Configure User Access Control and Permissions in 10 minutes

Backpack - Configure User Access Control and Permissions in 10 minutes

Comments
4 min read
Security news weekly round-up - 15th November 2024

Security news weekly round-up - 15th November 2024

4
Comments
3 min read
Meme Monday

Meme Monday

10
Comments
1 min read
Security news weekly round-up - 25th October 2024

Security news weekly round-up - 25th October 2024

1
Comments
5 min read
How to create a sudo user

How to create a sudo user

Comments
4 min read
Allowing any app on macOS

Allowing any app on macOS

7
Comments
1 min read
Upgrading Simple Shells to Fully Interactive TTYs

Upgrading Simple Shells to Fully Interactive TTYs

6
Comments
2 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

Comments
1 min read
Part 3/3: Advanced Frontend Security Techniques and Tools

Part 3/3: Advanced Frontend Security Techniques and Tools

10
Comments
2 min read
Web Security in Frontend Development: A 3-Part Series for Developers

Web Security in Frontend Development: A 3-Part Series for Developers

9
Comments
2 min read
Part 2/3: Practical Steps to Secure Frontend Applications

Part 2/3: Practical Steps to Secure Frontend Applications

5
Comments
3 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments
3 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Comments
3 min read
AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats

AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats

12
Comments
8 min read
Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

12
Comments 1
3 min read
Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

6
Comments
3 min read
Deep Dive 🤿: Where Does Grype Data Come From?

Deep Dive 🤿: Where Does Grype Data Come From?

8
Comments 1
8 min read
The Importance of Regular Software Updates and Patching Vulnerabilities

The Importance of Regular Software Updates and Patching Vulnerabilities

Comments
4 min read
How I'm Learning SpiceDB

How I'm Learning SpiceDB

11
Comments
4 min read
Secret Linux Commands:

Secret Linux Commands:

Comments 1
1 min read
Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

6
Comments
6 min read
Implementación de Autenticación Segura en Node.js con JWT

Implementación de Autenticación Segura en Node.js con JWT

Comments
4 min read
loading...