DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

What Technologies Help Prevent Cyber Attacks? ๐Ÿ›ก๏ธ๐Ÿ’ป

2
Comments
1 min read
๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

๐‚๐ซ๐ž๐š๐ญ๐ข๐ง๐  ๐š ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฌ๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐›๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ: ๐ค๐ž๐ฒ ๐ฌ๐ญ๐š๐ ๐ž๐ฌ ๐š๐ง๐ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

1
Comments
1 min read
How to Apply a Magento 2 Patch

How to Apply a Magento 2 Patch

5
Comments 2
2 min read
JWT for Developers: Behind the Scenes.

JWT for Developers: Behind the Scenes.

4
Comments 1
4 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
How to Design Secure and Safe APIs: 12 Essential Tips for API Security

How to Design Secure and Safe APIs: 12 Essential Tips for API Security

2
Comments
3 min read
Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

6
Comments
1 min read
๐Ÿ›ก๏ธ Key cybersecurity threats in 2024: What should businesses know?

๐Ÿ›ก๏ธ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
Como um Malware opera, quais sรฃo os seus tipos e como se proteger.

Como um Malware opera, quais sรฃo os seus tipos e como se proteger.

3
Comments
5 min read
Gone in 120 seconds

Gone in 120 seconds

1
Comments
5 min read
How to Implement Two-Factor Authentication (2FA) in Golang

How to Implement Two-Factor Authentication (2FA) in Golang

17
Comments
16 min read
Quarterly Rewards for security researchers๏ผ

Quarterly Rewards for security researchers๏ผ

1
Comments
1 min read
Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

3
Comments 1
1 min read
๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.