DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Simplify Configuration Management for Efficient Cloud Operations

Simplify Configuration Management for Efficient Cloud Operations

Comments
3 min read
PrivatePing - A Secure Messaging Application

PrivatePing - A Secure Messaging Application

5
Comments
2 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

1
Comments
5 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
How to secure an existing SSH key with a passphrase

How to secure an existing SSH key with a passphrase

5
Comments
2 min read
How to generate a secure and robust SSH key in 2024

How to generate a secure and robust SSH key in 2024

5
Comments
2 min read
Why using a passphrase to secure your SSH key ?

Why using a passphrase to secure your SSH key ?

7
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Understanding Firewalls: Your First Line of Cyber Defense

Understanding Firewalls: Your First Line of Cyber Defense

Comments
12 min read
How to Monitor and Protect Your Google Activity History

How to Monitor and Protect Your Google Activity History

Comments
9 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Extending legacy healthcare software: RPA technology

Extending legacy healthcare software: RPA technology

5
Comments
4 min read
The Adventures of Blink #17: Continuous Security... DevSecOps!

The Adventures of Blink #17: Continuous Security... DevSecOps!

Comments
5 min read
7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

16
Comments
4 min read
Common Security Vulnerabilities in the Blockchain World

Common Security Vulnerabilities in the Blockchain World

1
Comments
4 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

1
Comments
6 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
Activity Monitoring and Audit in AWS

Activity Monitoring and Audit in AWS

Comments
5 min read
Key derivation in .NET using HKDF

Key derivation in .NET using HKDF

Comments
3 min read
Improving user experience with passwordless authentication

Improving user experience with passwordless authentication

3
Comments
5 min read
Rethinking password security: say goodbye to plaintext passwords

Rethinking password security: say goodbye to plaintext passwords

1
Comments
5 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

Comments
2 min read
All You Need To Know To Secure Your Data From Phishing

All You Need To Know To Secure Your Data From Phishing

6
Comments
4 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Power Platform - DLP Policies

Power Platform - DLP Policies

19
Comments 1
6 min read
Advanced Analytics and Monitoring in Cyber Threat Detection

Advanced Analytics and Monitoring in Cyber Threat Detection

1
Comments
2 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
Next.js authentication using Clerk, Drizzle ORM, and Neon

Next.js authentication using Clerk, Drizzle ORM, and Neon

1
Comments
10 min read
Bridging Code and Security: Unveiling the Power of DevSecOps

Bridging Code and Security: Unveiling the Power of DevSecOps

6
Comments
13 min read
Take the pain to learn user authentication before you use an external provider

Take the pain to learn user authentication before you use an external provider

8
Comments 3
6 min read
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

1
Comments
1 min read
CORS Error Explained and How to Fix It?

CORS Error Explained and How to Fix It?

18
Comments 3
3 min read
Secure protected API with HMAC! Next Level of API Keys 🔐

Secure protected API with HMAC! Next Level of API Keys 🔐

1
Comments
4 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

87
Comments 7
8 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Segurança de IA

Segurança de IA

1
Comments
6 min read
Understanding the Principle of "Least Privilege" in AWS

Understanding the Principle of "Least Privilege" in AWS

Comments
2 min read
Securing the Cloud #22

Securing the Cloud #22

Comments
5 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

1
Comments
6 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

4
Comments
6 min read
60 Years of the IBM System/360: A Legacy of Reliability and Security

60 Years of the IBM System/360: A Legacy of Reliability and Security

2
Comments 1
2 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

26
Comments
14 min read
Discover the Difference Between Port 80 and 443

Discover the Difference Between Port 80 and 443

6
Comments 1
3 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Bash Bunny getting started

Bash Bunny getting started

1
Comments
1 min read
Demystifying OAuth 2.0 with a Clubbing Analogy

Demystifying OAuth 2.0 with a Clubbing Analogy

2
Comments
3 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
How to manage Access Control in Solidity Smart Contract

How to manage Access Control in Solidity Smart Contract

Comments
3 min read
Workshop - How to Write Custom Security Tests

Workshop - How to Write Custom Security Tests

Comments
1 min read
O que é HTTP?

O que é HTTP?

1
Comments
3 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
Automatización para la creación de imágenes con Amazon EC2 Image Builder

Automatización para la creación de imágenes con Amazon EC2 Image Builder

2
Comments
14 min read
🤖 Building RAG chatbot with NeMo Guardrails !💡

🤖 Building RAG chatbot with NeMo Guardrails !💡

Comments
2 min read
loading...