DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Adding login to your Next.js app using the app directory with SuperTokens

Adding login to your Next.js app using the app directory with SuperTokens

Comments
13 min read
Coinbase VS SEC

Coinbase VS SEC

1
Comments
1 min read
Obfuscating your create react app and routes

Obfuscating your create react app and routes

7
Comments 6
4 min read
WebSecurity e a sua importância

WebSecurity e a sua importância

13
Comments 1
5 min read
Whispeer: Elevating Privacy in Messaging

Whispeer: Elevating Privacy in Messaging

Comments
2 min read
A NodeJS Package that verifies if a string contains a potential SSRF attack: ssrfcheck

A NodeJS Package that verifies if a string contains a potential SSRF attack: ssrfcheck

16
Comments 1
2 min read
How to track anything on the internet or use Playwright for fun and profit

How to track anything on the internet or use Playwright for fun and profit

8
Comments 8
9 min read
Privacy First: Understanding How the Best Web Browsers Protect Your Data Neverinstall Team

Privacy First: Understanding How the Best Web Browsers Protect Your Data Neverinstall Team

Comments
4 min read
Beyond Passwords: 7 Emerging Technologies in Identity Verification

Beyond Passwords: 7 Emerging Technologies in Identity Verification

Comments
2 min read
How to ensure that all the routes on my Symfony app have access control

How to ensure that all the routes on my Symfony app have access control

5
Comments
9 min read
The Role of ChatGPT in Automation, Performance, and Security Testing

The Role of ChatGPT in Automation, Performance, and Security Testing

Comments
3 min read
Understanding Django's Secure Password Encryption

Understanding Django's Secure Password Encryption

3
Comments 1
2 min read
Datadog Resource Inventory

Datadog Resource Inventory

Comments
3 min read
Common Security Vulnerabilities in Dockerfiles

Common Security Vulnerabilities in Dockerfiles

Comments
3 min read
Understanding XSS: It's More Than Just a Script

Understanding XSS: It's More Than Just a Script

11
Comments 2
3 min read
How to reduce Docker image size for IoT devices

How to reduce Docker image size for IoT devices

1
Comments
10 min read
VLAN

VLAN

11
Comments
2 min read
20 Steps to Strengthen Your WordPress Security in 2024

20 Steps to Strengthen Your WordPress Security in 2024

Comments
7 min read
The Art of Validation in Laravel: A Comprehensive Guide

The Art of Validation in Laravel: A Comprehensive Guide

2
Comments 1
3 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

6
Comments
7 min read
Help! My database was compromised!

Help! My database was compromised!

9
Comments 1
7 min read
Cybersecurity Best Practices for Small Businesses

Cybersecurity Best Practices for Small Businesses

1
Comments
2 min read
Host PHP8.1 Laravel Application using Terraform on AWS.

Host PHP8.1 Laravel Application using Terraform on AWS.

1
Comments
1 min read
7 Common Front End security attacks

7 Common Front End security attacks

111
Comments 17
2 min read
5 Common E-Commerce Mistakes Businesses Make in 2024

5 Common E-Commerce Mistakes Businesses Make in 2024

Comments
2 min read
Signature Électronique : Principe et Perspectives Juridiques Internationales

Signature Électronique : Principe et Perspectives Juridiques Internationales

Comments
4 min read
Elevating Cybersecurity Consciousness

Elevating Cybersecurity Consciousness

1
Comments 1
2 min read
Zero Trust Architecture: Principles and Practical Use Cases

Zero Trust Architecture: Principles and Practical Use Cases

Comments
9 min read
10 Best Practices for securing a kubernetes cluster with AWS

10 Best Practices for securing a kubernetes cluster with AWS

3
Comments
5 min read
Terrapin SSH Attack: An Overview

Terrapin SSH Attack: An Overview

Comments
3 min read
Node mTLS from scratch

Node mTLS from scratch

15
Comments
3 min read
API Security Breaches: Learning from Past Incidents

API Security Breaches: Learning from Past Incidents

2
Comments
5 min read
Dancing | HackTheBox Write-up

Dancing | HackTheBox Write-up

5
Comments
3 min read
Cryptographic Foundations: A Comprehensive Introduction

Cryptographic Foundations: A Comprehensive Introduction

1
Comments
4 min read
Appwrite is now GDPR compliant

Appwrite is now GDPR compliant

6
Comments
2 min read
Exploring AWS Certificate Manager

Exploring AWS Certificate Manager

2
Comments
2 min read
Photon Lockdown | HackTheBox Write-up

Photon Lockdown | HackTheBox Write-up

7
Comments
3 min read
Fawn | HackTheBox Write-up

Fawn | HackTheBox Write-up

6
Comments
3 min read
How to Secure Your Secrets Manager with GitGuardian Honeytoken

How to Secure Your Secrets Manager with GitGuardian Honeytoken

Comments
5 min read
🔐 Introducing My Secure Password Generator App VUE JS + Bulma

🔐 Introducing My Secure Password Generator App VUE JS + Bulma

Comments
1 min read
Using customized access tokens to set up authorization in API Gateway

Using customized access tokens to set up authorization in API Gateway

1
Comments
7 min read
Using customized access tokens to set up authorization in API Gateway

Using customized access tokens to set up authorization in API Gateway

2
Comments
7 min read
How to create Private DynamoDB tables accessible only within a VPC

How to create Private DynamoDB tables accessible only within a VPC

2
Comments
4 min read
Call for Speakers for the 2024 Carolina Code Conference is open until April 15th

Call for Speakers for the 2024 Carolina Code Conference is open until April 15th

Comments
1 min read
Are Random numbers really random?

Are Random numbers really random?

11
Comments 38
6 min read
NixOS on Raspberry Pi 4 with Encrypted Filesystem

NixOS on Raspberry Pi 4 with Encrypted Filesystem

1
Comments
6 min read
Coding the Shield: A Deep Dive into the Development of the Discord Bot that Blocked 1000+ Phishing Attacks

Coding the Shield: A Deep Dive into the Development of the Discord Bot that Blocked 1000+ Phishing Attacks

7
Comments 1
5 min read
LUKS Encrypt 🔐 Raspberry PI 🍓🥧

LUKS Encrypt 🔐 Raspberry PI 🍓🥧

7
Comments 3
2 min read
Secure Your Spring Boot and Angular Application with JWT Authentication: A Comprehensive Guide

Secure Your Spring Boot and Angular Application with JWT Authentication: A Comprehensive Guide

26
Comments
7 min read
End-to-End encryption in Swift

End-to-End encryption in Swift

Comments
8 min read
Microsoft Sentinel : Using KQL to detect failed login on Linux

Microsoft Sentinel : Using KQL to detect failed login on Linux

2
Comments
3 min read
Securing Data: Apache APISIX's Strategies Against Leakage

Securing Data: Apache APISIX's Strategies Against Leakage

5
Comments
3 min read
User Management Unveiled: An Architectural Overview

User Management Unveiled: An Architectural Overview

5
Comments
2 min read
ACME Integration for Effortless TLS Certificates

ACME Integration for Effortless TLS Certificates

Comments
2 min read
Strengthening Security with IAM Roles and OpenID Connect in GitHub Actions Deploy Workflows

Strengthening Security with IAM Roles and OpenID Connect in GitHub Actions Deploy Workflows

3
Comments
5 min read
Keep it cool and secure: do's and don'ts for managing Web App secrets

Keep it cool and secure: do's and don'ts for managing Web App secrets

1
Comments
7 min read
HackTheBox - Writeup Sau [Retired]

HackTheBox - Writeup Sau [Retired]

Comments
7 min read
Meow | HackTheBox Write-up

Meow | HackTheBox Write-up

10
Comments
2 min read
Introduction to SQL Injection Attacks

Introduction to SQL Injection Attacks

Comments
4 min read
Introduction to Database Awareness

Introduction to Database Awareness

5
Comments
3 min read
loading...