DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS Penetration Testing Insights

AWS Penetration Testing Insights

11
Comments 1
3 min read
The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

The Fake Job Listings That Was Just a Front for Pushing Malware - My Story

30
Comments 2
5 min read
Código seguro com OWASP e SSDLC - 1 Top Ten

Código seguro com OWASP e SSDLC - 1 Top Ten

2
Comments
3 min read
Understanding the MD5 Function

Understanding the MD5 Function

Comments
2 min read
Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

Cracking the Code: Unlocking Password-Protected PDFs with Masked Brute Force

4
Comments 1
5 min read
Using AWS Network Access Analyzer to Explore your Network

Using AWS Network Access Analyzer to Explore your Network

Comments
2 min read
How to Impersonate a Service Account Using Bigquery Client Library

How to Impersonate a Service Account Using Bigquery Client Library

1
Comments
2 min read
It doesn't take an APT to hack devs via a packaging ecosystem

It doesn't take an APT to hack devs via a packaging ecosystem

2
Comments 1
4 min read
AWS CDK: Principle of Least Privilege

AWS CDK: Principle of Least Privilege

9
Comments
3 min read
We've always done it this way

We've always done it this way

Comments
3 min read
Configure Image Automation with Flux

Configure Image Automation with Flux

8
Comments
4 min read
Should we use VPN on browsing?

Should we use VPN on browsing?

Comments
4 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
The cost of false positives in software security, Part 1: Small applications

The cost of false positives in software security, Part 1: Small applications

5
Comments
6 min read
Automating Kubernetes Deployments with Flux

Automating Kubernetes Deployments with Flux

15
Comments
5 min read
How to Secure Vercel Cron Job routes in NextJS 13

How to Secure Vercel Cron Job routes in NextJS 13

2
Comments
3 min read
Security Token Offering (STO) Platform - Revolutionizing Fundraising

Security Token Offering (STO) Platform - Revolutionizing Fundraising

5
Comments
3 min read
Top 10 Hackers

Top 10 Hackers

11
Comments 11
9 min read
How to Detect Online Fraud and Protect Yourself Against Identity Theft

How to Detect Online Fraud and Protect Yourself Against Identity Theft

2
Comments
6 min read
Security Best Practices For GitHub Actions Secrets

Security Best Practices For GitHub Actions Secrets

7
Comments 3
5 min read
Software Supply Chain Security for Python Developers - Part 2

Software Supply Chain Security for Python Developers - Part 2

Comments
5 min read
An Introduction to Software Supply Chains for Python Developers - Part 1

An Introduction to Software Supply Chains for Python Developers - Part 1

1
Comments
4 min read
Security Tips: Metadata

Security Tips: Metadata

Comments
6 min read
50 Essential Linux Server Security Hardening Tips

50 Essential Linux Server Security Hardening Tips

4
Comments
8 min read
Cybersecurity In The World Of Generative AI

Cybersecurity In The World Of Generative AI

1
Comments 2
2 min read
Navigating CAA DNS Records with AWS: A Deep Dive

Navigating CAA DNS Records with AWS: A Deep Dive

2
Comments
3 min read
WebSocket security: 9 common vulnerabilities & prevention methods

WebSocket security: 9 common vulnerabilities & prevention methods

7
Comments
13 min read
Fortify Your Database: Supabase's Row Level Security

Fortify Your Database: Supabase's Row Level Security

2
Comments
3 min read
Firebase & PowerShell Execution Policy

Firebase & PowerShell Execution Policy

1
Comments
3 min read
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2

Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2

Comments
4 min read
Why you need Interactive Application Security Testing (IAST) 🔒

Why you need Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Using Content Security Policy headers with React & emotion

Using Content Security Policy headers with React & emotion

47
Comments 4
3 min read
Security Vulnerabilities Developers Needed to Know

Security Vulnerabilities Developers Needed to Know

Comments
9 min read
AWS WAF Implementation Guide: Setting Up with Terraform for Enhanced Security

AWS WAF Implementation Guide: Setting Up with Terraform for Enhanced Security

12
Comments
4 min read
How easy is it to steal credentials from Jenkins with Commit Access?

How easy is it to steal credentials from Jenkins with Commit Access?

11
Comments
6 min read
Enhancing Application Security with DDoS Simulation Testing in AWS

Enhancing Application Security with DDoS Simulation Testing in AWS

2
Comments
7 min read
Everything People Don't Get About CVEs

Everything People Don't Get About CVEs

2
Comments
6 min read
Securing Apache Age: Best Practices for Protecting Your Graph Data

Securing Apache Age: Best Practices for Protecting Your Graph Data

Comments
3 min read
AWS Secrets Manager vs. Systems Manager Parameter Store - Choosing the Right Solution for Your Needs

AWS Secrets Manager vs. Systems Manager Parameter Store - Choosing the Right Solution for Your Needs

20
Comments
5 min read
Internet Anonymity 101: The Ultimate Guide for Staying Anonymous Online

Internet Anonymity 101: The Ultimate Guide for Staying Anonymous Online

Comments
4 min read
Using JLink to create smaller Docker images for your Spring Boot Java application

Using JLink to create smaller Docker images for your Spring Boot Java application

3
Comments
6 min read
Unraveling the Mystery of Prompt Injection with OpenAI's Models

Unraveling the Mystery of Prompt Injection with OpenAI's Models

2
Comments
3 min read
Authenticating users in the load balancer with Cognito

Authenticating users in the load balancer with Cognito

7
Comments
6 min read
Synthetic Monitoring Metrics: What are the Key Performance Insights?

Synthetic Monitoring Metrics: What are the Key Performance Insights?

Comments
6 min read
Click, Install, Browse: Easy Security Extensions for Everyone

Click, Install, Browse: Easy Security Extensions for Everyone

3
Comments
4 min read
Xecrets File Command Line cryptographic toolbox for Windows, macOS and Linux

Xecrets File Command Line cryptographic toolbox for Windows, macOS and Linux

1
Comments
1 min read
🦠 Malware Demystified: Navigating the Digital Threat Landscape

🦠 Malware Demystified: Navigating the Digital Threat Landscape

6
Comments 1
3 min read
Top 5 WordPress Security Threats

Top 5 WordPress Security Threats

5
Comments
2 min read
Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Comments
8 min read
What is Linux and Why Do Hackers Use It?

What is Linux and Why Do Hackers Use It?

3
Comments 2
3 min read
Práticas Recomendadas de Segurança para Aplicações React

Práticas Recomendadas de Segurança para Aplicações React

2
Comments
3 min read
Exploring AWS Security vs Azure Security: A Comprehensive Guide for 2023

Exploring AWS Security vs Azure Security: A Comprehensive Guide for 2023

3
Comments
19 min read
The Data Cloud’s Cheese and Diamond Problem

The Data Cloud’s Cheese and Diamond Problem

15
Comments
9 min read
📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

5
Comments 2
4 min read
What the heck is Token-Based Authentication?

What the heck is Token-Based Authentication?

7
Comments
3 min read
Perl Stream Cipher

Perl Stream Cipher

1
Comments
1 min read
Account Abstraction

Account Abstraction

2
Comments
2 min read
PHP PDO : PHP Data Object

PHP PDO : PHP Data Object

2
Comments
4 min read
Power Apps - Security Review

Power Apps - Security Review

28
Comments 3
5 min read
Online Security - A Simple Guide

Online Security - A Simple Guide

Comments
4 min read
loading...