DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Should crypto be boring?

Should crypto be boring?

8
Comments
1 min read
Modifying Go's Crypto/ssh library for CVE-2020-9283

Modifying Go's Crypto/ssh library for CVE-2020-9283

7
Comments
6 min read
Zoombombing — a case study of data protection

Zoombombing — a case study of data protection

15
Comments
8 min read
How to Create a Minecraft Server: Hardening the Server

How to Create a Minecraft Server: Hardening the Server

9
Comments 1
4 min read
Easy user authentication with Next.js

Easy user authentication with Next.js

146
Comments 12
4 min read
Deploying Secure Firecracker MicroVMs on K8s using Weave FireKube

Deploying Secure Firecracker MicroVMs on K8s using Weave FireKube

10
Comments
4 min read
How to do a quick network recon during a pentest or CTF

How to do a quick network recon during a pentest or CTF

20
Comments
2 min read
Get Your Github Repo Verified

Get Your Github Repo Verified

6
Comments
1 min read
Hacker Container for Kubernetes Security Assessments

Hacker Container for Kubernetes Security Assessments

5
Comments
3 min read
Free VPN [WireGuard] Setup 🇬🇧

Free VPN [WireGuard] Setup 🇬🇧

41
Comments
7 min read
Security news weekly round-up - 5th June 2020

Security news weekly round-up - 5th June 2020

3
Comments
3 min read
Security Authentication vs. Authorization: What You Need to Know

Security Authentication vs. Authorization: What You Need to Know

68
Comments 5
5 min read
Security in a Django Application

Security in a Django Application

10
Comments
1 min read
30D2R - February: Web Application Basics

30D2R - February: Web Application Basics

6
Comments
5 min read
Minority Report on Let’s Encrypt CAA Rechecking

Minority Report on Let’s Encrypt CAA Rechecking

9
Comments
15 min read
Automating AWS SSO and G-Suite synchronisation with SSO Sync

Automating AWS SSO and G-Suite synchronisation with SSO Sync

21
Comments 4
5 min read
What is secret sprawl, why it’s dangerous, and how developers can prevent it?

What is secret sprawl, why it’s dangerous, and how developers can prevent it?

3
Comments
5 min read
Adding SSL when using Heroku and Namecheap

Adding SSL when using Heroku and Namecheap

11
Comments
2 min read
Pentesting Report: Attack Narrative Series Part 2: Threat Modeling

Pentesting Report: Attack Narrative Series Part 2: Threat Modeling

12
Comments
2 min read
Artificial Intelligence In Cyber Security

Artificial Intelligence In Cyber Security

26
Comments
2 min read
Automated Software Security Testing for Devs

Automated Software Security Testing for Devs

26
Comments
1 min read
Migrating existing code to a new password hashing algorithm

Migrating existing code to a new password hashing algorithm

5
Comments
2 min read
Writeup: HackTheBox Blue- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Blue- Without Metasploit (OSCP Prep)

4
Comments
3 min read
SliceHeader Literals in Go create a GC Race and Flawed Escape-Analysis. Exploitation with unsafe.Pointer on Real-World Code

SliceHeader Literals in Go create a GC Race and Flawed Escape-Analysis. Exploitation with unsafe.Pointer on Real-World Code

8
Comments
18 min read
Como tornar sua API express mais segura com Helmet

Como tornar sua API express mais segura com Helmet

13
Comments 1
2 min read
loading...