DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to enforce MFA in AWS - Part I - Create User, Role & Policy

How to enforce MFA in AWS - Part I - Create User, Role & Policy

Comments
2 min read
How to enforce MFA in AWS - Part II - Using `aws` CLI and terraform with MFA

How to enforce MFA in AWS - Part II - Using `aws` CLI and terraform with MFA

2
Comments
2 min read
Analyzing the HamsterWheel: An Advanced State Management Vulnerability in Sui's Blockchain Architecture

Analyzing the HamsterWheel: An Advanced State Management Vulnerability in Sui's Blockchain Architecture

Comments
12 min read
Orchestrate your Organization around Best Practices, Security, Audit & Account Management using AWS Control Tower

Orchestrate your Organization around Best Practices, Security, Audit & Account Management using AWS Control Tower

1
Comments
3 min read
Auth, Auth, Auth?

Auth, Auth, Auth?

5
Comments
5 min read
Atrelar máquina Linux ao Active Directory

Atrelar máquina Linux ao Active Directory

7
Comments
3 min read
Secure Coding Best Practices

Secure Coding Best Practices

1
Comments
8 min read
How AppMap's runtime analysis finds performance and security flaws

How AppMap's runtime analysis finds performance and security flaws

7
Comments
6 min read
What's in a Name? Decoding the Language of Today's Cloud-Native Security Solutions

What's in a Name? Decoding the Language of Today's Cloud-Native Security Solutions

1
Comments
6 min read
Secure by Design: Enhancing React.js Application Security

Secure by Design: Enhancing React.js Application Security

2
Comments
9 min read
Docker Scoutによる脆弱性・依存性のスキャニング

Docker Scoutによる脆弱性・依存性のスキャニング

Comments
20 min read
Vulnerability and Dependency Scanning with Docker Scout

Vulnerability and Dependency Scanning with Docker Scout

Comments
23 min read
Ethernaut - Lvl 8: Vault

Ethernaut - Lvl 8: Vault

Comments
2 min read
Password isn't dying

Password isn't dying

7
Comments
5 min read
Security starts before the production deployment

Security starts before the production deployment

4
Comments
5 min read
5 Lessons Learned Connecting Every IdP to OIDC

5 Lessons Learned Connecting Every IdP to OIDC

5
Comments
7 min read
How to create your private VPN with WireGuard

How to create your private VPN with WireGuard

Comments
3 min read
How to Integrate Docker Scout with GitHub Actions

How to Integrate Docker Scout with GitHub Actions

3
Comments
5 min read
The Developer’s Guide to Start Using SSH

The Developer’s Guide to Start Using SSH

1
Comments
8 min read
[PT-BR] - Entenda CORS e saiba lidar com os erros!

[PT-BR] - Entenda CORS e saiba lidar com os erros!

22
Comments 2
2 min read
DevOpsDays 2023 Prague

DevOpsDays 2023 Prague

6
Comments 1
6 min read
What is Web Application Security?

What is Web Application Security?

5
Comments
2 min read
Easy way to Solve Captcha Using JavaScript & 2Captcha

Easy way to Solve Captcha Using JavaScript & 2Captcha

9
Comments 2
6 min read
Top 20 C# Security Interview Questions +(Answers)

Top 20 C# Security Interview Questions +(Answers)

35
Comments 1
22 min read
AWS re:Inforce 2023 keynote highlights

AWS re:Inforce 2023 keynote highlights

15
Comments
4 min read
Adding Free SSL/TLS on Kubernetes (using CertManager and LetsEncrypt)

Adding Free SSL/TLS on Kubernetes (using CertManager and LetsEncrypt)

87
Comments 4
3 min read
Tornado Cash Hack: 1M $ vanished ⁉️

Tornado Cash Hack: 1M $ vanished ⁉️

1
Comments
3 min read
Introduction to Amazon Detective

Introduction to Amazon Detective

10
Comments
4 min read
Password Managers In The Passkey-Era

Password Managers In The Passkey-Era

2
Comments 1
2 min read
Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

4
Comments
5 min read
How To Install TLS/SSL on Docker Nginx Container With Let’s Encrypt

How To Install TLS/SSL on Docker Nginx Container With Let’s Encrypt

32
Comments 2
5 min read
What are Privacy Protection in CISSP?

What are Privacy Protection in CISSP?

1
Comments
2 min read
What Developers Can Learn from Taylor Swift's Re-recording Strategy

What Developers Can Learn from Taylor Swift's Re-recording Strategy

9
Comments
5 min read
Using AWS CLI Securely with IAM Roles and MFA

Using AWS CLI Securely with IAM Roles and MFA

1
Comments
5 min read
Understanding CORS and Same Origin Policy in Web Security🚨

Understanding CORS and Same Origin Policy in Web Security🚨

18
Comments 2
3 min read
How to Set Up a Custom Domain and Get a Free SSL Certificate on Firebase

How to Set Up a Custom Domain and Get a Free SSL Certificate on Firebase

Comments
3 min read
Enhancing Data Security: Unveiling IMDSv2's Shield Against Vulnerabilities in IMDSv1

Enhancing Data Security: Unveiling IMDSv2's Shield Against Vulnerabilities in IMDSv1

1
Comments
4 min read
Social Engineering: What if the user opens backdoors to strangers?

Social Engineering: What if the user opens backdoors to strangers?

Comments
1 min read
AWS Users, Roles, and Identity Center Demystified

AWS Users, Roles, and Identity Center Demystified

14
Comments 1
10 min read
Privacy by Design and Privacy by Default in the Cloud

Privacy by Design and Privacy by Default in the Cloud

3
Comments
6 min read
Playing Around with AWS-Vault for Fun & Profit

Playing Around with AWS-Vault for Fun & Profit

1
Comments
7 min read
What is Single Sign-On and Why do organizations should use it?

What is Single Sign-On and Why do organizations should use it?

4
Comments 1
4 min read
AWS Pentesting: Flaws.cloud level 2

AWS Pentesting: Flaws.cloud level 2

Comments 1
3 min read
Setup HTTPS with NGINX and Certbot

Setup HTTPS with NGINX and Certbot

3
Comments
6 min read
Offensive Git Forensics: Flaws.cloud Level3

Offensive Git Forensics: Flaws.cloud Level3

Comments
9 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part two, configuring Keycloak as my Identity provider

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part two, configuring Keycloak as my Identity provider

2
Comments
5 min read
Potential path traversal vulnerability when using File class and its solution

Potential path traversal vulnerability when using File class and its solution

8
Comments
4 min read
Top open source security devtools you need to know about

Top open source security devtools you need to know about

17
Comments 3
3 min read
An Overview of Kubernetes Security Projects at KubeCon Europe 2023

An Overview of Kubernetes Security Projects at KubeCon Europe 2023

5
Comments
7 min read
👨🏻‍💻Securing Your Web Applications from SQL Injection with SQLMap

👨🏻‍💻Securing Your Web Applications from SQL Injection with SQLMap

18
Comments 4
6 min read
Secure Your Next.js Application: Essential Security Practices and Tools

Secure Your Next.js Application: Essential Security Practices and Tools

7
Comments
2 min read
The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

2
Comments
4 min read
Do you make these small mistakes with HTTP status code?

Do you make these small mistakes with HTTP status code?

2
Comments
5 min read
Understanding JWT-Based Authentication

Understanding JWT-Based Authentication

Comments
3 min read
Secure Deploys from GitHub with the AWS CDK

Secure Deploys from GitHub with the AWS CDK

1
Comments
5 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

12
Comments
6 min read
How to discover the user’s IP address using Telegram.

How to discover the user’s IP address using Telegram.

477
Comments 4
4 min read
Como descobrir o endereço IP do usuário usando Telegram.

Como descobrir o endereço IP do usuário usando Telegram.

73
Comments
4 min read
How I saw too much information coming back from a company’s backend

How I saw too much information coming back from a company’s backend

2
Comments
11 min read
Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

8
Comments
3 min read
loading...