DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
O arco-íris da cybersegurança

O arco-íris da cybersegurança

186
Comments 12
4 min read
What is the easiest way to do auth?

What is the easiest way to do auth?

1
Comments 6
1 min read
How to Secure Your Router: A Comprehensive Guide to Fortify Your Home Network

How to Secure Your Router: A Comprehensive Guide to Fortify Your Home Network

Comments
5 min read
Authentication for Spring Boot App with Authgear and OAuth2

Authentication for Spring Boot App with Authgear and OAuth2

10
Comments 2
7 min read
AWS Blueprint for Ransomware Defense - Resumen

AWS Blueprint for Ransomware Defense - Resumen

Comments
11 min read
How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

Comments
6 min read
How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

1
Comments
4 min read
Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

1
Comments
9 min read
Understanding JWTs: A Simple Guide for Beginners

Understanding JWTs: A Simple Guide for Beginners

102
Comments 9
2 min read
How to Secure A Linux VPS?

How to Secure A Linux VPS?

7
Comments
4 min read
Id or UUID: Which one should you use as the primary key in your DB?

Id or UUID: Which one should you use as the primary key in your DB?

1
Comments
3 min read
RBAC for Exchange Online Mailboxes

RBAC for Exchange Online Mailboxes

5
Comments
4 min read
Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

21
Comments 2
9 min read
In-App Authentication Made Easy With Biometric API

In-App Authentication Made Easy With Biometric API

Comments
3 min read
Demystifying AWS Partitions

Demystifying AWS Partitions

4
Comments
4 min read
NPM Security Attacks

NPM Security Attacks

Comments
2 min read
7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

2
Comments
3 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

21
Comments 2
17 min read
Docker Container Security - Practices to Consider

Docker Container Security - Practices to Consider

1
Comments
4 min read
Exploring Cross-Site Scripting with React and Tauri

Exploring Cross-Site Scripting with React and Tauri

5
Comments
5 min read
Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

5
Comments
4 min read
Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

20
Comments 18
4 min read
An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

2
Comments 1
3 min read
Size Matters

Size Matters

7
Comments
4 min read
OpenSSL generating self-signed certificates - part 2

OpenSSL generating self-signed certificates - part 2

3
Comments
2 min read
Implementing Apple's Device Check App Attest Protocol

Implementing Apple's Device Check App Attest Protocol

22
Comments
8 min read
Advanced Credential Rotation for IAM Users with a Grace Period

Advanced Credential Rotation for IAM Users with a Grace Period

6
Comments
6 min read
OpenSSL verify Private Key and Certificate Match - part 3

OpenSSL verify Private Key and Certificate Match - part 3

8
Comments
1 min read
3 Common API Security Testing Misconceptions

3 Common API Security Testing Misconceptions

Comments
4 min read
From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

19
Comments 3
18 min read
PHP 8.2: the SensitiveParameter attribute

PHP 8.2: the SensitiveParameter attribute

16
Comments 1
1 min read
Exploring Ethereum Wallets: A Comprehensive Guide

Exploring Ethereum Wallets: A Comprehensive Guide

19
Comments 3
13 min read
Using Metlo to Secure My Personal Finance App

Using Metlo to Secure My Personal Finance App

26
Comments
4 min read
Techno Security & Digital Forensics Conference East 2023

Techno Security & Digital Forensics Conference East 2023

2
Comments
10 min read
Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

2
Comments
7 min read
How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

1
Comments
9 min read
Certificações gratuitas para cibersegurança

Certificações gratuitas para cibersegurança

Comments
2 min read
Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

5
Comments
3 min read
Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

1
Comments
5 min read
Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

4
Comments
14 min read
Fast guide, creating a ssh key pair for the user in Linux

Fast guide, creating a ssh key pair for the user in Linux

2
Comments
1 min read
Demystifying Public Key Cryptography: Exploring Ethereum, Digital Signatures, and Wallet Management

Demystifying Public Key Cryptography: Exploring Ethereum, Digital Signatures, and Wallet Management

22
Comments 1
15 min read
What's new in the CIS v2.0 benchmark for AWS

What's new in the CIS v2.0 benchmark for AWS

4
Comments 1
3 min read
Exploring Test Automation in Cybersecurity Penetration Testing

Exploring Test Automation in Cybersecurity Penetration Testing

1
Comments 2
3 min read
GitHub : Dependabot suas dependencias atualizadas e seguras

GitHub : Dependabot suas dependencias atualizadas e seguras

Comments
3 min read
Laravel Validation: Tips and Tricks for Building Secure Applications

Laravel Validation: Tips and Tricks for Building Secure Applications

1
Comments
1 min read
Database and Scaling : Backend Development [Part 2/2]

Database and Scaling : Backend Development [Part 2/2]

1
Comments
8 min read
My Wedding Guestbook

My Wedding Guestbook

2
Comments 4
1 min read
10 Essential DevOps Best Practices For Efficient Software Delivery

10 Essential DevOps Best Practices For Efficient Software Delivery

Comments 1
4 min read
Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

2
Comments
3 min read
The Final Mile

The Final Mile

9
Comments
2 min read
Encrypting objects with dual-layer server-side encryption using Lambda functions

Encrypting objects with dual-layer server-side encryption using Lambda functions

3
Comments
5 min read
8 Must-Have Infrastructure Reconnaissance Tools for Your App Security

8 Must-Have Infrastructure Reconnaissance Tools for Your App Security

1
Comments
2 min read
Why Metasploit ?!

Why Metasploit ?!

5
Comments
2 min read
Container Security - Strengthening the Heart of your Operations

Container Security - Strengthening the Heart of your Operations

2
Comments 2
4 min read
Denylists and Invaliding user access

Denylists and Invaliding user access

12
Comments 2
11 min read
10 Dicas Basicas de Arquitetura de Código : 3 - Cuidado com o que você armazena no seu código

10 Dicas Basicas de Arquitetura de Código : 3 - Cuidado com o que você armazena no seu código

1
Comments
3 min read
Interview with Greg Molnar - Rails developer and penetration tester

Interview with Greg Molnar - Rails developer and penetration tester

4
Comments
7 min read
CrabNebula: A New Star Forge Emerges

CrabNebula: A New Star Forge Emerges

5
Comments
4 min read
loading...