DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Automating Vulnerability Detection for Your Assets

Automating Vulnerability Detection for Your Assets

Comments
13 min read
Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

2
Comments
4 min read
🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

136
Comments 9
6 min read
TLS vs SSL

TLS vs SSL

Comments
2 min read
Understanding "working-directory" in GitHub Actions

Understanding "working-directory" in GitHub Actions

16
Comments
3 min read
Issue 67 of AWS Cloud Security Weekly

Issue 67 of AWS Cloud Security Weekly

1
Comments
1 min read
How to Secure Your Instagram Account?

How to Secure Your Instagram Account?

4
Comments
2 min read
Streamline Keyper CI/CD Pipeline with Keyper's Github Action

Streamline Keyper CI/CD Pipeline with Keyper's Github Action

1
Comments
4 min read
Advanced Container Security Techniques for DevSecOps Pipelines

Advanced Container Security Techniques for DevSecOps Pipelines

1
Comments
6 min read
Addressing The Threat of Deepfakes With Authentic Images

Addressing The Threat of Deepfakes With Authentic Images

Comments
8 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

9
Comments
4 min read
Simple flowchart from basic to advanced for data request to retrieval from API

Simple flowchart from basic to advanced for data request to retrieval from API

Comments 1
2 min read
Who is a Hacker?

Who is a Hacker?

7
Comments
8 min read
The Ultimate Guide to Protecting Your Online Privacy in 2024

The Ultimate Guide to Protecting Your Online Privacy in 2024

1
Comments 2
3 min read
Serverless AI powered content moderation service

Serverless AI powered content moderation service

8
Comments
6 min read
Kubernetes Probes

Kubernetes Probes

14
Comments
6 min read
StatefulSets in Kubernetes

StatefulSets in Kubernetes

13
Comments
8 min read
Essential Security Practices to Protect Your PHP Application from Common Vulnerabilities

Essential Security Practices to Protect Your PHP Application from Common Vulnerabilities

5
Comments
4 min read
🔒 Mastering OAuth 2.0 in Modern Web Applications: Security Best Practices for 2024 🚀

🔒 Mastering OAuth 2.0 in Modern Web Applications: Security Best Practices for 2024 🚀

6
Comments
4 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

3
Comments
5 min read
Securing Your Spring Boot Application with Spring Security

Securing Your Spring Boot Application with Spring Security

3
Comments
4 min read
Creación de Contenedores con Servidores SSH: Enfoque Práctico y Seguro

Creación de Contenedores con Servidores SSH: Enfoque Práctico y Seguro

2
Comments
4 min read
How to Use ENV variables in GitHub Actions

How to Use ENV variables in GitHub Actions

6
Comments
3 min read
Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Comments
5 min read
Security news weekly round-up - 18th October 2024

Security news weekly round-up - 18th October 2024

1
Comments
5 min read
Issue 68 of AWS Cloud Security Weekly

Issue 68 of AWS Cloud Security Weekly

2
Comments
2 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses

The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses

5
Comments
8 min read
Essential SQL Database Security Practices to Protect Your Data

Essential SQL Database Security Practices to Protect Your Data

Comments
4 min read
How To Find Zombie Hosts With Nmap?

How To Find Zombie Hosts With Nmap?

Comments
2 min read
Issue 65 of AWS Cloud Security Weekly

Issue 65 of AWS Cloud Security Weekly

1
Comments
2 min read
Kubernetes Network Policies

Kubernetes Network Policies

12
Comments
6 min read
Kubernetes Service Accounts: Guide

Kubernetes Service Accounts: Guide

8
Comments 1
10 min read
Security Configuration in HTTP headers

Security Configuration in HTTP headers

Comments
2 min read
Wednesday Links - Edition 2024-09-25

Wednesday Links - Edition 2024-09-25

Comments
1 min read
Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Comments
3 min read
Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline

Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline

1
Comments
3 min read
Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Comments
2 min read
I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

19
Comments
5 min read
AWS Session Manager vs SSH

AWS Session Manager vs SSH

1
Comments
5 min read
Security and Data Protection in Crypto Exchange Mining Pools

Security and Data Protection in Crypto Exchange Mining Pools

Comments
2 min read
Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Comments
3 min read
Is Your Phone Hacked? Signs and Steps to Take

Is Your Phone Hacked? Signs and Steps to Take

Comments
3 min read
Ansible Vault Cheatsheet: Mastering Secure Configuration Management

Ansible Vault Cheatsheet: Mastering Secure Configuration Management

5
Comments
5 min read
Best Practices for Working with Docker: Networking, Security, and Optimization

Best Practices for Working with Docker: Networking, Security, and Optimization

11
Comments
6 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
Introduction to SSH setup

Introduction to SSH setup

Comments
4 min read
Steps to fix package security vulnerabilities in your JS project

Steps to fix package security vulnerabilities in your JS project

1
Comments
3 min read
Docker Security: Best Practices, Configurations, and Real-Life Scenarios

Docker Security: Best Practices, Configurations, and Real-Life Scenarios

Comments
5 min read
How To Get There: Bridging The Technology Gap Preventing You From Adopting A Secrets-free Machine Identity Framework

How To Get There: Bridging The Technology Gap Preventing You From Adopting A Secrets-free Machine Identity Framework

2
Comments 1
6 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
Mastering Authentication in Node.js and Express: A Comprehensive Guide

Mastering Authentication in Node.js and Express: A Comprehensive Guide

Comments
4 min read
Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀

Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀

Comments
2 min read
How to avoid bricking your device during update rollouts

How to avoid bricking your device during update rollouts

Comments
2 min read
SAST, DAST, and IAST: Approaches to Testing Application Security

SAST, DAST, and IAST: Approaches to Testing Application Security

8
Comments 1
6 min read
Ensure a robust and secure environment

Ensure a robust and secure environment

Comments
2 min read
Understanding SafeTensors: A Secure Alternative to Pickle for ML Models

Understanding SafeTensors: A Secure Alternative to Pickle for ML Models

2
Comments
4 min read
How to mitigate attacks on WordPress when running under a full CDN like Cloudflare

How to mitigate attacks on WordPress when running under a full CDN like Cloudflare

Comments
7 min read
An Overview of the Kalp Studio Authentication

An Overview of the Kalp Studio Authentication

5
Comments
4 min read
loading...