DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

Ethereum's Oracles: Unleashing Trustless Wisdom from Beyond the Blockchain

21
Comments 2
9 min read
In-App Authentication Made Easy With Biometric API

In-App Authentication Made Easy With Biometric API

Comments
3 min read
Demystifying AWS Partitions

Demystifying AWS Partitions

4
Comments
4 min read
NPM Security Attacks

NPM Security Attacks

Comments
2 min read
7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

7 Tips to Secure Your Node.js Application and Avoid Security Vulnerabilities

2
Comments
3 min read
Boost Your Mortgage Software Security: Proven Tools and Practices

Boost Your Mortgage Software Security: Proven Tools and Practices

1
Comments
5 min read
Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

Exploring ERC20 Tokens: The Powerhouse Behind Ethereum's Tokenized World4

21
Comments 2
17 min read
Docker Container Security - Practices to Consider

Docker Container Security - Practices to Consider

1
Comments
4 min read
Exploring Cross-Site Scripting with React and Tauri

Exploring Cross-Site Scripting with React and Tauri

5
Comments
5 min read
Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

Criptografar Amazon EBS utilizando KMS com CMK gerenciada pelo cliente

5
Comments
4 min read
An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

An Intro to NIM: The Python-Like Programming Language Used By Malicious Ransomware Developers

2
Comments 1
3 min read
Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

Security: "Over 83% of Developers Commit this Critical Mistake when storing User's Password." Are You One of Them?"

20
Comments 18
4 min read
Size Matters

Size Matters

7
Comments
4 min read
OpenSSL generating self-signed certificates - part 2

OpenSSL generating self-signed certificates - part 2

3
Comments
2 min read
Implementing Apple's Device Check App Attest Protocol

Implementing Apple's Device Check App Attest Protocol

24
Comments
8 min read
Advanced Credential Rotation for IAM Users with a Grace Period

Advanced Credential Rotation for IAM Users with a Grace Period

6
Comments
6 min read
OpenSSL verify Private Key and Certificate Match - part 3

OpenSSL verify Private Key and Certificate Match - part 3

8
Comments
1 min read
3 Common API Security Testing Misconceptions

3 Common API Security Testing Misconceptions

Comments
4 min read
From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

From Bits to Blockchain: The Inner Workings of Ethereum Transactions Explained

19
Comments 3
18 min read
PHP 8.2: the SensitiveParameter attribute

PHP 8.2: the SensitiveParameter attribute

16
Comments 1
1 min read
Exploring Ethereum Wallets: A Comprehensive Guide

Exploring Ethereum Wallets: A Comprehensive Guide

20
Comments 3
13 min read
Using Metlo to Secure My Personal Finance App

Using Metlo to Secure My Personal Finance App

26
Comments
4 min read
Techno Security & Digital Forensics Conference East 2023

Techno Security & Digital Forensics Conference East 2023

2
Comments
10 min read
Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

Enhancing Authorization Efficiency: The Power of Relational-Based Access Control

2
Comments
7 min read
How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

1
Comments
9 min read
Certificações gratuitas para cibersegurança

Certificações gratuitas para cibersegurança

Comments
2 min read
Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

Android 13’s Restricted Setting: A Stronghold Against Malicious Apps

6
Comments
3 min read
Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

Credit Card Fraud Detection: A Machine Learning Approach To Combat Financial Fraud

1
Comments
5 min read
Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

Unlock the Power of OAuth: A Journey to Secure and Reliable Applications

4
Comments
14 min read
Fast guide, creating a ssh key pair for the user in Linux

Fast guide, creating a ssh key pair for the user in Linux

2
Comments
1 min read
Demystifying Public Key Cryptography: Exploring Ethereum, Digital Signatures, and Wallet Management

Demystifying Public Key Cryptography: Exploring Ethereum, Digital Signatures, and Wallet Management

22
Comments 1
15 min read
What's new in the CIS v2.0 benchmark for AWS

What's new in the CIS v2.0 benchmark for AWS

4
Comments 1
3 min read
Exploring Test Automation in Cybersecurity Penetration Testing

Exploring Test Automation in Cybersecurity Penetration Testing

1
Comments 2
3 min read
GitHub : Dependabot suas dependencias atualizadas e seguras

GitHub : Dependabot suas dependencias atualizadas e seguras

Comments
3 min read
Laravel Validation: Tips and Tricks for Building Secure Applications

Laravel Validation: Tips and Tricks for Building Secure Applications

1
Comments
1 min read
Database and Scaling : Backend Development [Part 2/2]

Database and Scaling : Backend Development [Part 2/2]

1
Comments
8 min read
GitHub's Push Protection: Enhancing Open-Source Security with Limitations to Consider

GitHub's Push Protection: Enhancing Open-Source Security with Limitations to Consider

1
Comments
7 min read
My Wedding Guestbook

My Wedding Guestbook

2
Comments 4
1 min read
10 Essential DevOps Best Practices For Efficient Software Delivery

10 Essential DevOps Best Practices For Efficient Software Delivery

Comments 1
4 min read
Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

Creative C2 Obfuscation: CloudFronting Through Firewalls and Hiding in Plain PCAP

2
Comments
3 min read
The Final Mile

The Final Mile

9
Comments
2 min read
Encrypting objects with dual-layer server-side encryption using Lambda functions

Encrypting objects with dual-layer server-side encryption using Lambda functions

3
Comments
5 min read
8 Must-Have Infrastructure Reconnaissance Tools for Your App Security

8 Must-Have Infrastructure Reconnaissance Tools for Your App Security

1
Comments
2 min read
Why Metasploit ?!

Why Metasploit ?!

5
Comments
2 min read
Container Security - Strengthening the Heart of your Operations

Container Security - Strengthening the Heart of your Operations

2
Comments 2
4 min read
Denylists and Invaliding user access

Denylists and Invaliding user access

12
Comments 2
11 min read
10 Dicas Basicas de Arquitetura de Código : 3 - Cuidado com o que você armazena no seu código

10 Dicas Basicas de Arquitetura de Código : 3 - Cuidado com o que você armazena no seu código

1
Comments
3 min read
Interview with Greg Molnar - Rails developer and penetration tester

Interview with Greg Molnar - Rails developer and penetration tester

4
Comments
7 min read
CrabNebula: A New Star Forge Emerges

CrabNebula: A New Star Forge Emerges

5
Comments
4 min read
Linux Permissions Unraveled: How to Avoid ‘chmod 777’ and Keep the Chaos at Bay!

Linux Permissions Unraveled: How to Avoid ‘chmod 777’ and Keep the Chaos at Bay!

1
Comments
5 min read
Passwordless Authentication: The Key to Preventing Credential Stuffing

Passwordless Authentication: The Key to Preventing Credential Stuffing

Comments
4 min read
Generating SSH key – the best way

Generating SSH key – the best way

Comments
2 min read
Secrets and Environment Variables in your GitHub Action

Secrets and Environment Variables in your GitHub Action

25
Comments 1
3 min read
10 steps to secure your Laravel Application

10 steps to secure your Laravel Application

2
Comments 1
2 min read
The essential security checklist for user identity

The essential security checklist for user identity

5
Comments
6 min read
Building Secure Docker Images for Production - Best Practices

Building Secure Docker Images for Production - Best Practices

25
Comments 4
7 min read
php[tek] 2023 - A Community Of Communities Powering The Internet

php[tek] 2023 - A Community Of Communities Powering The Internet

2
Comments
9 min read
GitHub Pages: Custom Domains and SSL

GitHub Pages: Custom Domains and SSL

2
Comments
4 min read
ChatGPT at Work: How to block Content Leaks 🔒

ChatGPT at Work: How to block Content Leaks 🔒

3
Comments
2 min read
Docker Secrets Best Practices: Protecting Sensitive Information in Containers

Docker Secrets Best Practices: Protecting Sensitive Information in Containers

13
Comments 2
6 min read
loading...