DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Developers are Using Offline AI Tools for Air-Gapped Security

How Developers are Using Offline AI Tools for Air-Gapped Security

Comments 2
8 min read
Read other users orders via CDN Caching - New vulnerability in SAP Commerce (CVE-2023-37486)

Read other users orders via CDN Caching - New vulnerability in SAP Commerce (CVE-2023-37486)

Comments
2 min read
What's New With AWS Security? | November Edition

What's New With AWS Security? | November Edition

4
Comments 1
6 min read
Exploring the Horizon of Digital Identity: The Concept of Encrypted-Sovereign Credentials (ENSC)

Exploring the Horizon of Digital Identity: The Concept of Encrypted-Sovereign Credentials (ENSC)

Comments 2
6 min read
Which is More Secure: Linux or Windows?

Which is More Secure: Linux or Windows?

6
Comments 1
3 min read
We built GPT Bot focused on API Security

We built GPT Bot focused on API Security

Comments
2 min read
Hacking embedded systems using the routersploit tool

Hacking embedded systems using the routersploit tool

1
Comments
2 min read
EKS on AWS re:Invent 2023

EKS on AWS re:Invent 2023

Comments
6 min read
LDAP protocol basics and the LDAP Injection attack

LDAP protocol basics and the LDAP Injection attack

5
Comments 1
4 min read
SYN Flood Attack

SYN Flood Attack

Comments
2 min read
DoS vs DDoS vs DRDDoS vs PoD attack

DoS vs DDoS vs DRDDoS vs PoD attack

Comments
3 min read
Cyber Security Analyst vs. Cyber Security Specialist

Cyber Security Analyst vs. Cyber Security Specialist

4
Comments
4 min read
What are polyglots and how to use them as a pentester

What are polyglots and how to use them as a pentester

Comments
4 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
What is Forward Proxy and Reverse Proxy

What is Forward Proxy and Reverse Proxy

9
Comments
2 min read
How cybercriminals steal your passwords by listening to your keyboard 🕵️‍♀️ 💁‍♀️

How cybercriminals steal your passwords by listening to your keyboard 🕵️‍♀️ 💁‍♀️

3
Comments 1
2 min read
AWS re:Invent 2023: Security Session Notes 📝

AWS re:Invent 2023: Security Session Notes 📝

3
Comments
7 min read
What is bind shell and reverse shell

What is bind shell and reverse shell

4
Comments 2
3 min read
What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)

What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)

Comments
3 min read
Security Workshop Part 1 - Put up a gate

Security Workshop Part 1 - Put up a gate

Comments
5 min read
Scanning ports and finding network vulnerabilities using nmap

Scanning ports and finding network vulnerabilities using nmap

9
Comments
7 min read
What is FIDO? — The Future of Secure and Passwordless Authentication

What is FIDO? — The Future of Secure and Passwordless Authentication

3
Comments
4 min read
Digital certificates And PKI

Digital certificates And PKI

Comments
5 min read
Metasploit explained for pentesters

Metasploit explained for pentesters

Comments
9 min read
“Scary” Rogue Access Point attack

“Scary” Rogue Access Point attack

2
Comments
7 min read
Search for sensitive data using theHarvester and h8mail tools

Search for sensitive data using theHarvester and h8mail tools

Comments
3 min read
Content Security Policy explained

Content Security Policy explained

Comments
3 min read
What is insecure deserialization

What is insecure deserialization

Comments
3 min read
Transition to OpenTelemetry, enhanced policy testing, and more - Cerbos v0.32

Transition to OpenTelemetry, enhanced policy testing, and more - Cerbos v0.32

3
Comments
2 min read
What are JWT?

What are JWT?

7
Comments 4
6 min read
Understanding Kubernetes Authentication and Authorization

Understanding Kubernetes Authentication and Authorization

3
Comments
2 min read
What is the TCP/IP model

What is the TCP/IP model

Comments
6 min read
Insecure Direct Object Reference (IDOR) vulnerability types

Insecure Direct Object Reference (IDOR) vulnerability types

Comments
3 min read
Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Comments
5 min read
What is JWT (Json Web Token)

What is JWT (Json Web Token)

Comments
2 min read
Clean authorization control in serverless functions

Clean authorization control in serverless functions

37
Comments 1
4 min read
Convert your WordPress site to static HTML with wget

Convert your WordPress site to static HTML with wget

Comments 1
2 min read
Adding a Privacy Layer to AWS PartyRock

Adding a Privacy Layer to AWS PartyRock

8
Comments
9 min read
Explore web applications through their content security policy (CSP)

Explore web applications through their content security policy (CSP)

5
Comments
5 min read
Demystifying IP Addresses with is.ipv4 and is.not_ipv4 from 'thiis': Your Friendly Guide to IP Validation

Demystifying IP Addresses with is.ipv4 and is.not_ipv4 from 'thiis': Your Friendly Guide to IP Validation

Comments 1
5 min read
Top 5 Posts tagged(#react) last week

Top 5 Posts tagged(#react) last week

Comments 1
2 min read
Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

5
Comments 2
5 min read
IP Address

IP Address

18
Comments 3
4 min read
Azure Data Storage Solutions: Enhancing Performance & Security for Cloud Architects

Azure Data Storage Solutions: Enhancing Performance & Security for Cloud Architects

1
Comments
2 min read
Code Security Best Practices: Protecting Your Projects When Collaborating and Using AI

Code Security Best Practices: Protecting Your Projects When Collaborating and Using AI

Comments
11 min read
Uncovering thousands of unique secrets in PyPI packages

Uncovering thousands of unique secrets in PyPI packages

2
Comments
10 min read
Effective Adversary Emulation

Effective Adversary Emulation

2
Comments
13 min read
Introducing agentless API discovery & inventory - Congrats to our tech team!

Introducing agentless API discovery & inventory - Congrats to our tech team!

5
Comments
1 min read
#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

Comments
3 min read
🔐 Enhancing Security of React Apps

🔐 Enhancing Security of React Apps

Comments
1 min read
HackTheBox — Writeup Pilgrimage [Retired]

HackTheBox — Writeup Pilgrimage [Retired]

Comments
12 min read
HackTheBox - Writeup Unobtainium [Retired]

HackTheBox - Writeup Unobtainium [Retired]

Comments
26 min read
Extraction of Artifacts from an NTFS Image File Using ntfsdump and ntfsfind

Extraction of Artifacts from an NTFS Image File Using ntfsdump and ntfsfind

Comments
3 min read
📜 RepoList - A tool to generate wordlists based on GitHub repositories

📜 RepoList - A tool to generate wordlists based on GitHub repositories

6
Comments 1
3 min read
Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Comments
4 min read
Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

2
Comments 2
4 min read
Exploit Development: Buffer Overflows

Exploit Development: Buffer Overflows

5
Comments
3 min read
Subnetting

Subnetting

15
Comments 3
3 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Comments
8 min read
loading...