DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

Comments
6 min read
Five Ways Your CI/CD Pipeline Can Be Exploited

Five Ways Your CI/CD Pipeline Can Be Exploited

2
Comments
5 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
Re-learning security: Encryption, Encoding, Hashing ☄

Re-learning security: Encryption, Encoding, Hashing ☄

Comments
7 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments
2 min read
Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Comments
10 min read
Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

2
Comments
5 min read
Protect secrets in Git with the clean/smudge filter

Protect secrets in Git with the clean/smudge filter

Comments
4 min read
How to Onboard and Protect Remote Teams with Secure Cloud Environments

How to Onboard and Protect Remote Teams with Secure Cloud Environments

7
Comments 1
5 min read
Cerbos Hub: Simplifying Authorization for Developers

Cerbos Hub: Simplifying Authorization for Developers

Comments
2 min read
Comparison between Data Privacy & Data Security

Comparison between Data Privacy & Data Security

Comments
3 min read
pip-audit: Managing pip Vulnerabilities

pip-audit: Managing pip Vulnerabilities

Comments
2 min read
Preventing Multiple Failed Input Attack using Redis and NodeJS

Preventing Multiple Failed Input Attack using Redis and NodeJS

Comments
4 min read
"Attestation check for Topics failed"

"Attestation check for Topics failed"

3
Comments
1 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

5
Comments
17 min read
Redeemer | HackTheBox Write-up

Redeemer | HackTheBox Write-up

5
Comments
3 min read
Methodology: How we discovered over 18,000 API secret tokens

Methodology: How we discovered over 18,000 API secret tokens

Comments
6 min read
Re-learning security: detecting package vulnerabilities 🎁 NPM and Nuget.

Re-learning security: detecting package vulnerabilities 🎁 NPM and Nuget.

1
Comments
6 min read
Git Security: Best Practices for Keeping Your Code Safe

Git Security: Best Practices for Keeping Your Code Safe

5
Comments
5 min read
How to mitigate ddos attack

How to mitigate ddos attack

Comments
4 min read
A Step-by-Step Guide to Implement JWT Authentication in NestJS using Passport

A Step-by-Step Guide to Implement JWT Authentication in NestJS using Passport

8
Comments
11 min read
Automatically Hash Laravel Model Values Using the "Hashed" Cast

Automatically Hash Laravel Model Values Using the "Hashed" Cast

4
Comments
5 min read
#DeveloperTipOfTheWeek - Application Security

#DeveloperTipOfTheWeek - Application Security

Comments 1
1 min read
Mad Devs’ #20 Newsletter. December 2023

Mad Devs’ #20 Newsletter. December 2023

Comments
4 min read
Unleash the Power of Security with GraphQL Protect: Fortifying Your GraphQL APIs

Unleash the Power of Security with GraphQL Protect: Fortifying Your GraphQL APIs

7
Comments
2 min read
The Best Authentication Methods for Your App (Decision Tree)

The Best Authentication Methods for Your App (Decision Tree)

Comments
1 min read
Patching your Auto Scaling Group on AWS

Patching your Auto Scaling Group on AWS

4
Comments
3 min read
Kicking the tires of Docker Scout

Kicking the tires of Docker Scout

9
Comments 3
3 min read
🤔Quem vai ler o que eu escrevo?

🤔Quem vai ler o que eu escrevo?

1
Comments
1 min read
Geo-restricting AWS Workspaces: Finding out how to cook parsnip soup

Geo-restricting AWS Workspaces: Finding out how to cook parsnip soup

1
Comments
5 min read
AWS networking Tips 🎬 Serie: ⚡ Cloud Superpower ⚡ 2.04

AWS networking Tips 🎬 Serie: ⚡ Cloud Superpower ⚡ 2.04

Comments
4 min read
Empowering Your Digital Security: Why Privacy Enthusiasts Should Embrace Hardware Security Keys

Empowering Your Digital Security: Why Privacy Enthusiasts Should Embrace Hardware Security Keys

Comments
3 min read
Unveiling the Power of Virtual Private Networks (VPNs)

Unveiling the Power of Virtual Private Networks (VPNs)

1
Comments 1
26 min read
Log4j2 in Spring boot

Log4j2 in Spring boot

Comments
2 min read
Understanding AWS Instance Metadata Service: A Closer Look

Understanding AWS Instance Metadata Service: A Closer Look

3
Comments
8 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
How to secure SSH server

How to secure SSH server

1
Comments
1 min read
Rate-limiting API Endpoint using Bucket4j in Spring

Rate-limiting API Endpoint using Bucket4j in Spring

Comments
2 min read
Creating DNS Zone in Azure the easiest way

Creating DNS Zone in Azure the easiest way

Comments
3 min read
Secure CloudSQL Connectivity with Google Cloud SQL Auth Proxy as Systemd

Secure CloudSQL Connectivity with Google Cloud SQL Auth Proxy as Systemd

Comments
3 min read
Getting Familiar with ChatCraft

Getting Familiar with ChatCraft

2
Comments
5 min read
Dealing With GitHub Password Authentication Deprecation

Dealing With GitHub Password Authentication Deprecation

1
Comments
4 min read
How To Use a SOCKS Proxy in Axios

How To Use a SOCKS Proxy in Axios

2
Comments
4 min read
You Can Now Create a Secure DuckDuckGo Email Account

You Can Now Create a Secure DuckDuckGo Email Account

1
Comments
3 min read
The Risks of API Integration and How to Mitigate Them

The Risks of API Integration and How to Mitigate Them

2
Comments
6 min read
Why should you care about the “security.txt” file on your website?

Why should you care about the “security.txt” file on your website?

1
Comments
3 min read
7 formas de adquirir experiência em cibersegurança

7 formas de adquirir experiência em cibersegurança

11
Comments
6 min read
Administra las credenciales de aplicaciĂłn con [EKS Pod Identity]

Administra las credenciales de aplicaciĂłn con [EKS Pod Identity]

2
Comments
5 min read
Kubernetes Container Policies: Enhancing Security and Efficiency

Kubernetes Container Policies: Enhancing Security and Efficiency

Comments
6 min read
Relationship Based Access Control (ReBAC): When To Use It

Relationship Based Access Control (ReBAC): When To Use It

7
Comments
8 min read
Vulnerability Scanning Solution

Vulnerability Scanning Solution

Comments
3 min read
Adding login to your Next.js app using the app directory with SuperTokens

Adding login to your Next.js app using the app directory with SuperTokens

Comments
13 min read
Coinbase VS SEC

Coinbase VS SEC

1
Comments
1 min read
Obfuscating your create react app and routes

Obfuscating your create react app and routes

7
Comments 6
4 min read
WebSecurity e a sua importância

WebSecurity e a sua importância

13
Comments 1
5 min read
Whispeer: Elevating Privacy in Messaging

Whispeer: Elevating Privacy in Messaging

Comments
2 min read
A NodeJS Package that verifies if a string contains a potential SSRF attack: ssrfcheck

A NodeJS Package that verifies if a string contains a potential SSRF attack: ssrfcheck

16
Comments 1
2 min read
How to track anything on the internet or use Playwright for fun and profit

How to track anything on the internet or use Playwright for fun and profit

8
Comments 8
9 min read
Privacy First: Understanding How the Best Web Browsers Protect Your Data Neverinstall Team

Privacy First: Understanding How the Best Web Browsers Protect Your Data Neverinstall Team

Comments
4 min read
loading...