DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure GitHub Actions by pull_request_target

Secure GitHub Actions by pull_request_target

4
Comments
7 min read
Extensive Guide to Gnu Privacy Guard (GPG)

Extensive Guide to Gnu Privacy Guard (GPG)

6
Comments
10 min read
Web Application Security 101

Web Application Security 101

2
Comments
1 min read
I'm a little iffy on Passkeys

I'm a little iffy on Passkeys

1
Comments
6 min read
JavaScript and Basic Security

JavaScript and Basic Security

6
Comments
3 min read
Gerando certificado SSL com certbot na Oracle Cloud Infrastructure

Gerando certificado SSL com certbot na Oracle Cloud Infrastructure

Comments
2 min read
Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

6
Comments
4 min read
How APISIX protects against the OWASP top 10 API security threats

How APISIX protects against the OWASP top 10 API security threats

23
Comments
12 min read
7 princípios básicos de segurança em cloud

7 princípios básicos de segurança em cloud

Comments
2 min read
Adding reCAPTCHA in MERN Application

Adding reCAPTCHA in MERN Application

Comments 1
3 min read
Cross-site Scripting and how to fix it

Cross-site Scripting and how to fix it

Comments
4 min read
Ever wondered if AI will someday provide a polynomial-time solution for a discrete logarithm? Let's talk about it!

Ever wondered if AI will someday provide a polynomial-time solution for a discrete logarithm? Let's talk about it!

Comments
2 min read
Running web scraping service securely

Running web scraping service securely

6
Comments
6 min read
The Unrivaled Strength of Java in Powering Backend Technologies

The Unrivaled Strength of Java in Powering Backend Technologies

1
Comments
2 min read
Kimlik Doğrulama Mekanizmaları

Kimlik Doğrulama Mekanizmaları

Comments 1
4 min read
My idea about hardening the cookie storage

My idea about hardening the cookie storage

1
Comments 2
1 min read
Introducing The Border0 Terraform Provider

Introducing The Border0 Terraform Provider

Comments
5 min read
PSRule module for Azure DevOps available for feedback

PSRule module for Azure DevOps available for feedback

1
Comments
1 min read
Cybersecurity and AI deep in the heart of Texas Cyber Summit

Cybersecurity and AI deep in the heart of Texas Cyber Summit

1
Comments
11 min read
How we cut our AWS costs by more than 50%

How we cut our AWS costs by more than 50%

2
Comments
3 min read
🚀 API authorization in API Maker

🚀 API authorization in API Maker

12
Comments
5 min read
Rethinking Password Strength Estimation: Beyond Composition Rules

Rethinking Password Strength Estimation: Beyond Composition Rules

4
Comments
4 min read
Understand CORS 🌐 in Easy Way🦾

Understand CORS 🌐 in Easy Way🦾

Comments
1 min read
Your Daily CVE Reminder 🦸🏻‍♀️

Your Daily CVE Reminder 🦸🏻‍♀️

3
Comments
3 min read
Unlocking the Power of WordPress: A Web Developer's Guide

Unlocking the Power of WordPress: A Web Developer's Guide

1
Comments
2 min read
Understanding the Fundamentals of API Security

Understanding the Fundamentals of API Security

8
Comments 1
8 min read
What is Password Hashing?

What is Password Hashing?

Comments
4 min read
Building a Secure Next.js Application with Redux Toolkit Query and cookie tokens

Building a Secure Next.js Application with Redux Toolkit Query and cookie tokens

31
Comments 3
7 min read
🐣 Step-by-Step Guide to Data Masking 🎭

🐣 Step-by-Step Guide to Data Masking 🎭

6
Comments
4 min read
The Future of Cyber security: Safeguarding Nigeria's Society

The Future of Cyber security: Safeguarding Nigeria's Society

Comments
2 min read
Using Tatum Key Management System(KMS) to sign transactions

Using Tatum Key Management System(KMS) to sign transactions

2
Comments
5 min read
Creating a Custom AWS Config Rule with a Lambda Function to Encrypt S3 Buckets

Creating a Custom AWS Config Rule with a Lambda Function to Encrypt S3 Buckets

1
Comments
3 min read
Azure Open AI in VNet

Azure Open AI in VNet

3
Comments
2 min read
DevSecOps at Cyberdyne: The tale of a CI attestation

DevSecOps at Cyberdyne: The tale of a CI attestation

Comments
5 min read
Azure DevOps Pipeline: no secrets, no certificates

Azure DevOps Pipeline: no secrets, no certificates

6
Comments 4
5 min read
Secrets management takes more than just tools

Secrets management takes more than just tools

Comments
13 min read
Symbolic Execution Fuzzing With KLEE

Symbolic Execution Fuzzing With KLEE

Comments
2 min read
The best application security tool is education

The best application security tool is education

6
Comments
4 min read
Grasping the concept of Cyber Security: its merits and importance.

Grasping the concept of Cyber Security: its merits and importance.

Comments
2 min read
Supercharge your Repository with Code Owners

Supercharge your Repository with Code Owners

83
Comments 27
3 min read
Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

5
Comments
5 min read
Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
Javascript Deobfuscation

Javascript Deobfuscation

8
Comments
3 min read
A Python steganography API at your service.

A Python steganography API at your service.

5
Comments
2 min read
Cybersecurity Trends for 2024: What You Need to Know

Cybersecurity Trends for 2024: What You Need to Know

Comments
2 min read
Getting Started with Vagrant for Local Development Environments

Getting Started with Vagrant for Local Development Environments

8
Comments
13 min read
Best Practices for AWS IAM: Strengthening Your Security

Best Practices for AWS IAM: Strengthening Your Security

Comments
4 min read
Protecting a Static Website with JWT and Lambda@Edge

Protecting a Static Website with JWT and Lambda@Edge

9
Comments
12 min read
Step by Step Guide to Authentication with JSON Web Tokens (JWT) with express and passport

Step by Step Guide to Authentication with JSON Web Tokens (JWT) with express and passport

38
Comments 1
7 min read
Understanding and Avoiding Modern Cyber Risks - A Detailed Guide for All

Understanding and Avoiding Modern Cyber Risks - A Detailed Guide for All

2
Comments
5 min read
The cost of false positives in software security, Part 2: Large applications

The cost of false positives in software security, Part 2: Large applications

5
Comments
4 min read
Automate Container Image Patching with Copacetic and GitHub Actions

Automate Container Image Patching with Copacetic and GitHub Actions

17
Comments
5 min read
AWS Penetration Testing Insights

AWS Penetration Testing Insights

12
Comments 1
3 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Código seguro com OWASP e SSDLC - 1 Top Ten

Código seguro com OWASP e SSDLC - 1 Top Ten

2
Comments
3 min read
Understanding the MD5 Function

Understanding the MD5 Function

Comments
2 min read
Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

4
Comments 1
5 min read
Using AWS Network Access Analyzer to Explore your Network

Using AWS Network Access Analyzer to Explore your Network

Comments
2 min read
How to Impersonate a Service Account Using Bigquery Client Library

How to Impersonate a Service Account Using Bigquery Client Library

1
Comments
2 min read
It doesn't take an APT to hack devs via a packaging ecosystem

It doesn't take an APT to hack devs via a packaging ecosystem

2
Comments 1
4 min read
loading...