DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

How to Block Unwanted SSH Login Attempts with PyFilter on Ubuntu 16.04

6
Comments 1
8 min read
Beware of browser extensions that track you everywhere

Beware of browser extensions that track you everywhere

109
Comments 15
1 min read
Testing A WordPress Plugin Can Be Fun!

Testing A WordPress Plugin Can Be Fun!

10
Comments 2
9 min read
Java - JVM Security Information Gathering

Java - JVM Security Information Gathering

10
Comments
2 min read
AWS S3 or the Pandora's box

AWS S3 or the Pandora's box

11
Comments
1 min read
How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

How do you protect your backend API in your microservice if you use a Single Page Application on the frontend?

18
Comments 7
2 min read
AWS and Messy Git Practices: SecDSM March MiniCTF Solution

AWS and Messy Git Practices: SecDSM March MiniCTF Solution

34
Comments 2
5 min read
Operation FGTNY 🗽 - Solving the H1-212 CTF.

Operation FGTNY 🗽 - Solving the H1-212 CTF.

11
Comments
11 min read
Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

Cloudflare and AWS Autoscaling Group for DDoS attack mitigation

12
Comments
4 min read
An analysis of logic flaws in web-of-trust services

An analysis of logic flaws in web-of-trust services

16
Comments
5 min read
Protect your Node.js app from Cross-Site Request Forgery

Protect your Node.js app from Cross-Site Request Forgery

160
Comments
6 min read
GitHub for Bug Bounty Hunters

GitHub for Bug Bounty Hunters

15
Comments
4 min read
Broken Link Hijacking - How expired links can be exploited.

Broken Link Hijacking - How expired links can be exploited.

12
Comments
3 min read
A House of Cards: An Exploration of Security When Building Docker Containers

A House of Cards: An Exploration of Security When Building Docker Containers

31
Comments 2
10 min read
A lightweight reconnaissance setup for bug bounty hunters

A lightweight reconnaissance setup for bug bounty hunters

13
Comments
2 min read
Find security issues before the code goes into production

Find security issues before the code goes into production

20
Comments 1
7 min read
Beyond the login screen - Part II

Beyond the login screen - Part II

14
Comments
5 min read
Visualize AWS Flow Logs in a Visual Environment (closed beta)

Visualize AWS Flow Logs in a Visual Environment (closed beta)

7
Comments
1 min read
Beyond the login screen - Part I

Beyond the login screen - Part I

17
Comments 2
2 min read
Homographs, Attack!

Homographs, Attack!

317
Comments 30
10 min read
Using HTTP Headers to Secure Your Site

Using HTTP Headers to Secure Your Site

225
Comments
9 min read
Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…

Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…

13
Comments 1
5 min read
Four Security Principles That Software Developers Should Follow

Four Security Principles That Software Developers Should Follow

211
Comments 21
8 min read
Please Stop Using Local Storage

Please Stop Using Local Storage

1122
Comments 203
11 min read
Security Sprint: What I learnt in a CTF

Security Sprint: What I learnt in a CTF

56
Comments 5
2 min read
loading...