DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Automate Container Image Patching with Copacetic and GitHub Actions

Automate Container Image Patching with Copacetic and GitHub Actions

17
Comments
5 min read
AWS Penetration Testing Insights

AWS Penetration Testing Insights

12
Comments 1
3 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
CĂłdigo seguro com OWASP e SSDLC - 1 Top Ten

CĂłdigo seguro com OWASP e SSDLC - 1 Top Ten

2
Comments
3 min read
Understanding the MD5 Function

Understanding the MD5 Function

Comments
2 min read
Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

3
Comments 1
5 min read
Using AWS Network Access Analyzer to Explore your Network

Using AWS Network Access Analyzer to Explore your Network

Comments
2 min read
How to Impersonate a Service Account Using Bigquery Client Library

How to Impersonate a Service Account Using Bigquery Client Library

1
Comments
2 min read
It doesn't take an APT to hack devs via a packaging ecosystem

It doesn't take an APT to hack devs via a packaging ecosystem

2
Comments 1
4 min read
AWS CDK: Principle of Least Privilege

AWS CDK: Principle of Least Privilege

8
Comments
3 min read
We've always done it this way

We've always done it this way

Comments
3 min read
Configure Image Automation with Flux

Configure Image Automation with Flux

7
Comments
4 min read
Should we use VPN on browsing?

Should we use VPN on browsing?

Comments
4 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
The cost of false positives in software security, Part 1: Small applications

The cost of false positives in software security, Part 1: Small applications

5
Comments
6 min read
Automating Kubernetes Deployments with Flux

Automating Kubernetes Deployments with Flux

15
Comments
5 min read
How to Secure Vercel Cron Job routes in NextJS 13

How to Secure Vercel Cron Job routes in NextJS 13

2
Comments
3 min read
Security Token Offering (STO) Platform - Revolutionizing Fundraising

Security Token Offering (STO) Platform - Revolutionizing Fundraising

5
Comments
3 min read
Top 10 Hackers

Top 10 Hackers

11
Comments 11
9 min read
How to Detect Online Fraud and Protect Yourself Against Identity Theft

How to Detect Online Fraud and Protect Yourself Against Identity Theft

2
Comments
6 min read
Security Best Practices For GitHub Actions Secrets

Security Best Practices For GitHub Actions Secrets

7
Comments 3
5 min read
Software Supply Chain Security for Python Developers - Part 2

Software Supply Chain Security for Python Developers - Part 2

Comments
5 min read
An Introduction to Software Supply Chains for Python Developers - Part 1

An Introduction to Software Supply Chains for Python Developers - Part 1

1
Comments
4 min read
Security Tips: Metadata

Security Tips: Metadata

Comments
6 min read
50 Essential Linux Server Security Hardening Tips

50 Essential Linux Server Security Hardening Tips

4
Comments
8 min read
Cybersecurity In The World Of Generative AI

Cybersecurity In The World Of Generative AI

1
Comments 2
2 min read
Navigating CAA DNS Records with AWS: A Deep Dive

Navigating CAA DNS Records with AWS: A Deep Dive

2
Comments
3 min read
WebSocket security: 9 common vulnerabilities & prevention methods

WebSocket security: 9 common vulnerabilities & prevention methods

6
Comments
13 min read
Fortify Your Database: Supabase's Row Level Security

Fortify Your Database: Supabase's Row Level Security

2
Comments
3 min read
Firebase & PowerShell Execution Policy

Firebase & PowerShell Execution Policy

1
Comments
3 min read
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2

Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2

Comments
4 min read
Why you need Interactive Application Security Testing (IAST) đź”’

Why you need Interactive Application Security Testing (IAST) đź”’

Comments
1 min read
Using Content Security Policy headers with React & emotion

Using Content Security Policy headers with React & emotion

46
Comments 4
3 min read
Security Vulnerabilities Developers Needed to Know

Security Vulnerabilities Developers Needed to Know

Comments
9 min read
AWS WAF Implementation Guide: Setting Up with Terraform for Enhanced Security

AWS WAF Implementation Guide: Setting Up with Terraform for Enhanced Security

10
Comments
4 min read
How easy is it to steal credentials from Jenkins with Commit Access?

How easy is it to steal credentials from Jenkins with Commit Access?

10
Comments
6 min read
Enhancing Application Security with DDoS Simulation Testing in AWS

Enhancing Application Security with DDoS Simulation Testing in AWS

1
Comments
7 min read
Everything People Don't Get About CVEs

Everything People Don't Get About CVEs

2
Comments
6 min read
Securing Apache Age: Best Practices for Protecting Your Graph Data

Securing Apache Age: Best Practices for Protecting Your Graph Data

Comments
3 min read
AWS Secrets Manager vs. Systems Manager Parameter Store - Choosing the Right Solution for Your Needs

AWS Secrets Manager vs. Systems Manager Parameter Store - Choosing the Right Solution for Your Needs

20
Comments
5 min read
Internet Anonymity 101: The Ultimate Guide for Staying Anonymous Online

Internet Anonymity 101: The Ultimate Guide for Staying Anonymous Online

Comments
4 min read
Using JLink to create smaller Docker images for your Spring Boot Java application

Using JLink to create smaller Docker images for your Spring Boot Java application

3
Comments
6 min read
Unraveling the Mystery of Prompt Injection with OpenAI's Models

Unraveling the Mystery of Prompt Injection with OpenAI's Models

2
Comments
3 min read
Authenticating users in the load balancer with Cognito

Authenticating users in the load balancer with Cognito

7
Comments
6 min read
Synthetic Monitoring Metrics: What are the Key Performance Insights?

Synthetic Monitoring Metrics: What are the Key Performance Insights?

Comments
6 min read
Click, Install, Browse: Easy Security Extensions for Everyone

Click, Install, Browse: Easy Security Extensions for Everyone

4
Comments
4 min read
Xecrets File Command Line cryptographic toolbox for Windows, macOS and Linux

Xecrets File Command Line cryptographic toolbox for Windows, macOS and Linux

1
Comments
1 min read
🦠 Malware Demystified: Navigating the Digital Threat Landscape

🦠 Malware Demystified: Navigating the Digital Threat Landscape

6
Comments 1
3 min read
Top 5 WordPress Security Threats

Top 5 WordPress Security Threats

5
Comments
2 min read
Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Comments
8 min read
What is Linux and Why Do Hackers Use It?

What is Linux and Why Do Hackers Use It?

3
Comments 2
3 min read
Práticas Recomendadas de Segurança para Aplicações React

Práticas Recomendadas de Segurança para Aplicações React

2
Comments
3 min read
Exploring AWS Security vs Azure Security: A Comprehensive Guide for 2023

Exploring AWS Security vs Azure Security: A Comprehensive Guide for 2023

3
Comments
19 min read
The Data Cloud’s Cheese and Diamond Problem

The Data Cloud’s Cheese and Diamond Problem

14
Comments
9 min read
đź“ťUnveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

đź“ťUnveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

5
Comments 2
4 min read
What the heck is Token-Based Authentication?

What the heck is Token-Based Authentication?

7
Comments
3 min read
Perl Stream Cipher

Perl Stream Cipher

1
Comments
1 min read
Account Abstraction

Account Abstraction

2
Comments
2 min read
PHP PDO : PHP Data Object

PHP PDO : PHP Data Object

2
Comments
4 min read
Power Apps - Security Review

Power Apps - Security Review

25
Comments 3
5 min read
loading...