DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Don't you think you should stop pushing unsecure code on Github ? (OWASP)

Don't you think you should stop pushing unsecure code on Github ? (OWASP)

14
Comments 2
12 min read
HTB CTF - I know Mag1k

HTB CTF - I know Mag1k

7
Comments
3 min read
8 free security tools every developer should know and use to Shift Left

8 free security tools every developer should know and use to Shift Left

12
Comments
7 min read
Security news weekly round-up - 15th May 2020

Security news weekly round-up - 15th May 2020

2
Comments
4 min read
What Exactly Do CyberSecurity Professionals Do 🤔?

What Exactly Do CyberSecurity Professionals Do 🤔?

11
Comments 2
1 min read
AMA: Where can we learn Threat Modelling?

AMA: Where can we learn Threat Modelling?

12
Comments 1
2 min read
HTB CTF - FreeLancer

HTB CTF - FreeLancer

14
Comments
5 min read
Mounting a second encrypted hard drive automatically under Debian or Ubuntu

Mounting a second encrypted hard drive automatically under Debian or Ubuntu

2
Comments 1
2 min read
How to Solve ERR_SSL_PROTOCOL_ERROR in Google Chrome

How to Solve ERR_SSL_PROTOCOL_ERROR in Google Chrome

3
Comments
4 min read
Riddikulus Passwords: Celebrate Passwords Every Day

Riddikulus Passwords: Celebrate Passwords Every Day

7
Comments 4
5 min read
If you want to build a treehouse, start at the bottom

If you want to build a treehouse, start at the bottom

31
Comments 1
4 min read
Hacker101 CTF - Cody's First Blog

Hacker101 CTF - Cody's First Blog

17
Comments 4
7 min read
Zoom has acquired Keybase

Zoom has acquired Keybase

57
Comments 29
1 min read
Hacker101 CTF - Ticketastic: Live Instance

Hacker101 CTF - Ticketastic: Live Instance

12
Comments 3
4 min read
Already Hacked - Security Environment of the System 01:21

Already Hacked - Security Environment of the System

4
Comments
1 min read
Exploitation Exercise with unsafe.Pointer in Go: Information Leak (Part 1)

Exploitation Exercise with unsafe.Pointer in Go: Information Leak (Part 1)

17
Comments
9 min read
Why 'Escaping' JavaScript is Dangerous

Why 'Escaping' JavaScript is Dangerous

19
Comments 1
3 min read
Preventing SQL injection: a Django author's perspective

Preventing SQL injection: a Django author's perspective

9
Comments
8 min read
CIA Triad in Information Security 🔐

CIA Triad in Information Security 🔐

4
Comments
1 min read
Protecting Azure Functions with API Management Service

Protecting Azure Functions with API Management Service

17
Comments 3
5 min read
Cyber Security

Cyber Security

3
Comments 2
1 min read
What is OAuth 2.0 / OpenID Connect?

What is OAuth 2.0 / OpenID Connect?

12
Comments
3 min read
How to use open source kube-scan to find Kubernetes security risks

How to use open source kube-scan to find Kubernetes security risks

7
Comments
3 min read
Getting started with Spring Security - Authentication and Authorization

Getting started with Spring Security - Authentication and Authorization

53
Comments 2
4 min read
Spyse - Cyberspace Search Engine

Spyse - Cyberspace Search Engine

5
Comments
4 min read
loading...