DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unraveling My Uncle's Online Gold Scam

Unraveling My Uncle's Online Gold Scam

8
Comments 2
8 min read
Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 5. Connecting dots

Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 5. Connecting dots

2
Comments 1
4 min read
Essential AWS IAM Enumeration Commands

Essential AWS IAM Enumeration Commands

2
Comments
6 min read
Guia de passo a passo para escrever um exploit.

Guia de passo a passo para escrever um exploit.

5
Comments
11 min read
API World 2023: Bringing together API, AI, and Secrets security

API World 2023: Bringing together API, AI, and Secrets security

1
Comments
9 min read
Zero Trust Architecture: The Future of Organisational Cyber Defence

Zero Trust Architecture: The Future of Organisational Cyber Defence

Comments
8 min read
The 🐞 hunt starts today!

The 🐞 hunt starts today!

Comments
1 min read
Authentication and Authorization: A comprehensive guide

Authentication and Authorization: A comprehensive guide

6
Comments
10 min read
Explorando a api do kubernetes

Explorando a api do kubernetes

Comments
9 min read
HackTheBox - Writeup Broker [Retired]

HackTheBox - Writeup Broker [Retired]

1
Comments
9 min read
🎆Party Time: Your Security Supporters with PartyRock

🎆Party Time: Your Security Supporters with PartyRock

4
Comments
3 min read
SSL Handshake: A Comprehensive Guide to SSL/TLS Protocols

SSL Handshake: A Comprehensive Guide to SSL/TLS Protocols

16
Comments 1
9 min read
HasMySecretLeaked - Building a Trustless and Secure Protocol

HasMySecretLeaked - Building a Trustless and Secure Protocol

13
Comments
8 min read
Enhancing Data Security with Column-Level Encryption: Best Practices

Enhancing Data Security with Column-Level Encryption: Best Practices

2
Comments
5 min read
How to Search for Open Amazon S3 Buckets and Their Contents Using OpenBuckets

How to Search for Open Amazon S3 Buckets and Their Contents Using OpenBuckets

1
Comments
3 min read
Cross-Origin Resource Sharing (CORS)

Cross-Origin Resource Sharing (CORS)

28
Comments 7
7 min read
Navigating the Browser Landscape with is.ie and is.not_ie from 'thiis': A Journey into Internet Explorer Detection

Navigating the Browser Landscape with is.ie and is.not_ie from 'thiis': A Journey into Internet Explorer Detection

5
Comments 1
3 min read
The Secure Path Forward for eBPF runtime: Challenges and Innovations

The Secure Path Forward for eBPF runtime: Challenges and Innovations

1
Comments
16 min read
Build a Cybersecurity Link-Analyzer with Go

Build a Cybersecurity Link-Analyzer with Go

1
Comments 2
4 min read
Docker Scout for Your Kubernetes Cluster

Docker Scout for Your Kubernetes Cluster

1
Comments
6 min read
Securing CI/CD Images with Cosign and OPA

Securing CI/CD Images with Cosign and OPA

2
Comments
5 min read
Security in modern Web Applications -> Owasp to the rescue!

Security in modern Web Applications -> Owasp to the rescue!

12
Comments 4
4 min read
Authorization

Authorization

2
Comments 1
3 min read
OPA vs. Google Zanzibar: A Brief Comparison

OPA vs. Google Zanzibar: A Brief Comparison

12
Comments
5 min read
Use SOPS in Ansible to read your secrets

Use SOPS in Ansible to read your secrets

2
Comments
12 min read
Unleashing the Power of `is.edge` and `is.not_edge` with 'thiis': Your Gateway to JavaScript Magic

Unleashing the Power of `is.edge` and `is.not_edge` with 'thiis': Your Gateway to JavaScript Magic

4
Comments 1
4 min read
Cyber Security Analyst vs. Cyber Security Consultant

Cyber Security Analyst vs. Cyber Security Consultant

2
Comments
4 min read
Navigating the Browser World with is.chrome and is.not_chrome: Your Friendly Guide to Browser Checks

Navigating the Browser World with is.chrome and is.not_chrome: Your Friendly Guide to Browser Checks

3
Comments 1
3 min read
What is IPsec? | How IPsec VPNs Work Explained!!

What is IPsec? | How IPsec VPNs Work Explained!!

5
Comments
9 min read
Google One's Dark Web Report - Safeguarding Your Digital Realm

Google One's Dark Web Report - Safeguarding Your Digital Realm

1
Comments
2 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

21
Comments 4
3 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

145
Comments 16
8 min read
Building Secure Foundations: A Practical Guide to Minimizing Linux Services' Attack Surface

Building Secure Foundations: A Practical Guide to Minimizing Linux Services' Attack Surface

4
Comments
11 min read
Secure your Web Applications with Facial Authentication

Secure your Web Applications with Facial Authentication

10
Comments 1
6 min read
Interceptando mensagens de erro com o nginx

Interceptando mensagens de erro com o nginx

Comments
4 min read
The Role of AI in Optimising API Performance

The Role of AI in Optimising API Performance

2
Comments
9 min read
Building your Product Security Roadmap

Building your Product Security Roadmap

Comments
1 min read
Guide to AWS GuardDuty Best Practices

Guide to AWS GuardDuty Best Practices

Comments
5 min read
Unleashing the Magic of `is.truthy` and `is.not_truthy` with 'thiis': A Playground of JavaScript Booleans

Unleashing the Magic of `is.truthy` and `is.not_truthy` with 'thiis': A Playground of JavaScript Booleans

4
Comments 1
3 min read
[Possible Fix] Inflight reported as a vulnerability in react project (Veracode SCA)

[Possible Fix] Inflight reported as a vulnerability in react project (Veracode SCA)

Comments 1
1 min read
Technical Overview of an Azure Security Incident

Technical Overview of an Azure Security Incident

Comments
7 min read
Rails Authentication for Compliance

Rails Authentication for Compliance

1
Comments 3
4 min read
Security Considerations in Kubernetes

Security Considerations in Kubernetes

Comments
6 min read
Dicas de codificação segura em C#

Dicas de codificação segura em C#

24
Comments 3
9 min read
C++ and the future

C++ and the future

Comments
1 min read
Yes, GitHub's Copilot can Leak (Real) Secrets

Yes, GitHub's Copilot can Leak (Real) Secrets

Comments
6 min read
Embrace the Power of `is.falsy` and `is.not_falsy` with 'thiis': A Journey into JavaScript Booleans

Embrace the Power of `is.falsy` and `is.not_falsy` with 'thiis': A Journey into JavaScript Booleans

2
Comments 1
3 min read
Mastering Booleans with is.true and is.not_true in JavaScript: Your Guide to True Values

Mastering Booleans with is.true and is.not_true in JavaScript: Your Guide to True Values

4
Comments 1
3 min read
Ensuring effective cloud security: Best practices and real-world insights

Ensuring effective cloud security: Best practices and real-world insights

3
Comments
8 min read
SSH as VPN Alternative

SSH as VPN Alternative

49
Comments 10
2 min read
Connecting with the community at BSides Atlanta 2023

Connecting with the community at BSides Atlanta 2023

Comments
8 min read
Kubescape 3.0 is available to enhance your K8s security experience

Kubescape 3.0 is available to enhance your K8s security experience

1
Comments
1 min read
The Easy MySQL Security In-Depth Guide to Best Practices

The Easy MySQL Security In-Depth Guide to Best Practices

Comments
13 min read
The Lazy Developer: Testing in production is real, but…

The Lazy Developer: Testing in production is real, but…

2
Comments
3 min read
Cross-Account CodeCommit Access from EC2

Cross-Account CodeCommit Access from EC2

Comments
10 min read
Unveiling the Unseen Security Threats of Remote Work

Unveiling the Unseen Security Threats of Remote Work

Comments
3 min read
Making JavaScript Fun with is.false and is.not_false from 'thiis'

Making JavaScript Fun with is.false and is.not_false from 'thiis'

3
Comments 1
4 min read
AWS Security Demystified: Secure Your Cloud Applications with the Shared Responsibility Model and Key Security Services

AWS Security Demystified: Secure Your Cloud Applications with the Shared Responsibility Model and Key Security Services

Comments
8 min read
AWS security audit guide

AWS security audit guide

2
Comments 1
3 min read
How to Secure Your Container Registries With GitGuardian's Honeytoken

How to Secure Your Container Registries With GitGuardian's Honeytoken

Comments
8 min read
loading...