DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Vulnerability and Dependency Scanning with Docker Scout

Vulnerability and Dependency Scanning with Docker Scout

Comments
23 min read
Ethernaut - Lvl 8: Vault

Ethernaut - Lvl 8: Vault

Comments
2 min read
Password isn't dying

Password isn't dying

7
Comments
5 min read
Security starts before the production deployment

Security starts before the production deployment

4
Comments
5 min read
5 Lessons Learned Connecting Every IdP to OIDC

5 Lessons Learned Connecting Every IdP to OIDC

5
Comments
7 min read
How to create your private VPN with WireGuard

How to create your private VPN with WireGuard

1
Comments
3 min read
The Developer’s Guide to Start Using SSH

The Developer’s Guide to Start Using SSH

1
Comments
8 min read
How to Integrate Docker Scout with GitHub Actions

How to Integrate Docker Scout with GitHub Actions

3
Comments
5 min read
[PT-BR] - Entenda CORS e saiba lidar com os erros!

[PT-BR] - Entenda CORS e saiba lidar com os erros!

22
Comments 2
2 min read
DevOpsDays 2023 Prague

DevOpsDays 2023 Prague

6
Comments 1
6 min read
What is Web Application Security?

What is Web Application Security?

5
Comments
2 min read
Easy way to Solve Captcha Using JavaScript & 2Captcha

Easy way to Solve Captcha Using JavaScript & 2Captcha

10
Comments 2
6 min read
Top 20 C# Security Interview Questions +(Answers)

Top 20 C# Security Interview Questions +(Answers)

35
Comments 1
22 min read
AWS re:Inforce 2023 keynote highlights

AWS re:Inforce 2023 keynote highlights

15
Comments
4 min read
Adding Free SSL/TLS on Kubernetes (using CertManager and LetsEncrypt)

Adding Free SSL/TLS on Kubernetes (using CertManager and LetsEncrypt)

97
Comments 4
3 min read
Tornado Cash Hack: 1M $ vanished ⁉

Tornado Cash Hack: 1M $ vanished ⁉

1
Comments
3 min read
Introduction to Amazon Detective

Introduction to Amazon Detective

10
Comments
4 min read
Password Managers In The Passkey-Era

Password Managers In The Passkey-Era

2
Comments 1
2 min read
Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

4
Comments
5 min read
How To Install TLS/SSL on Docker Nginx Container With Let’s Encrypt

How To Install TLS/SSL on Docker Nginx Container With Let’s Encrypt

32
Comments 2
5 min read
What are Privacy Protection in CISSP?

What are Privacy Protection in CISSP?

1
Comments
2 min read
What Developers Can Learn from Taylor Swift's Re-recording Strategy

What Developers Can Learn from Taylor Swift's Re-recording Strategy

9
Comments
5 min read
Using AWS CLI Securely with IAM Roles and MFA

Using AWS CLI Securely with IAM Roles and MFA

1
Comments
5 min read
Understanding CORS and Same Origin Policy in Web Security🚹

Understanding CORS and Same Origin Policy in Web Security🚹

18
Comments 2
3 min read
How to Set Up a Custom Domain and Get a Free SSL Certificate on Firebase

How to Set Up a Custom Domain and Get a Free SSL Certificate on Firebase

Comments
3 min read
Enhancing Data Security: Unveiling IMDSv2's Shield Against Vulnerabilities in IMDSv1

Enhancing Data Security: Unveiling IMDSv2's Shield Against Vulnerabilities in IMDSv1

1
Comments
4 min read
Social Engineering: What if the user opens backdoors to strangers?

Social Engineering: What if the user opens backdoors to strangers?

Comments
1 min read
AWS Users, Roles, and Identity Center Demystified

AWS Users, Roles, and Identity Center Demystified

14
Comments 1
10 min read
Privacy by Design and Privacy by Default in the Cloud

Privacy by Design and Privacy by Default in the Cloud

3
Comments
6 min read
Playing Around with AWS-Vault for Fun & Profit

Playing Around with AWS-Vault for Fun & Profit

1
Comments
7 min read
What is Single Sign-On and Why do organizations should use it?

What is Single Sign-On and Why do organizations should use it?

4
Comments 1
4 min read
AWS Pentesting: Flaws.cloud level 2

AWS Pentesting: Flaws.cloud level 2

Comments 1
3 min read
Setup HTTPS with NGINX and Certbot

Setup HTTPS with NGINX and Certbot

3
Comments
6 min read
Offensive Git Forensics: Flaws.cloud Level3

Offensive Git Forensics: Flaws.cloud Level3

Comments
9 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part two, configuring Keycloak as my Identity provider

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part two, configuring Keycloak as my Identity provider

2
Comments
5 min read
Potential path traversal vulnerability when using File class and its solution

Potential path traversal vulnerability when using File class and its solution

10
Comments
4 min read
Top open source security devtools you need to know about

Top open source security devtools you need to know about

17
Comments 3
3 min read
An Overview of Kubernetes Security Projects at KubeCon Europe 2023

An Overview of Kubernetes Security Projects at KubeCon Europe 2023

5
Comments
7 min read
đŸ‘šđŸ»â€đŸ’»Securing Your Web Applications from SQL Injection with SQLMap

đŸ‘šđŸ»â€đŸ’»Securing Your Web Applications from SQL Injection with SQLMap

18
Comments 4
6 min read
Secure Your Next.js Application: Essential Security Practices and Tools

Secure Your Next.js Application: Essential Security Practices and Tools

7
Comments
2 min read
The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

The Importance of Security in Launchpad Development: How to Keep Your Platform Safe

2
Comments
4 min read
Do you make these small mistakes with HTTP status code?

Do you make these small mistakes with HTTP status code?

2
Comments
5 min read
Understanding JWT-Based Authentication

Understanding JWT-Based Authentication

Comments
3 min read
Secure Deploys from GitHub with the AWS CDK

Secure Deploys from GitHub with the AWS CDK

1
Comments
5 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

12
Comments
6 min read
How to discover the user’s IP address using Telegram.

How to discover the user’s IP address using Telegram.

508
Comments 5
4 min read
Como descobrir o endereço IP do usuårio usando Telegram.

Como descobrir o endereço IP do usuårio usando Telegram.

77
Comments
4 min read
How I saw too much information coming back from a company’s backend

How I saw too much information coming back from a company’s backend

2
Comments
11 min read
Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

8
Comments
3 min read
What is a IAM Principal?

What is a IAM Principal?

9
Comments 1
6 min read
Build Custom Authentication Using Appsmith and APISIX

Build Custom Authentication Using Appsmith and APISIX

52
Comments
9 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

13
Comments 1
15 min read
Best Practices for Staying Safe on Public Wi-Fi Networks

Best Practices for Staying Safe on Public Wi-Fi Networks

3
Comments
4 min read
AWS IAM: Allowing a Role to Assume Another Role

AWS IAM: Allowing a Role to Assume Another Role

Comments
2 min read
Spring security in a nutshell

Spring security in a nutshell

1
Comments
5 min read
Understanding Role-Based Access Control with ASP.NET Web APIs

Understanding Role-Based Access Control with ASP.NET Web APIs

26
Comments
3 min read
The curious case of AWS IAM's policies

The curious case of AWS IAM's policies

Comments
4 min read
Security headers - what they are and how to use them 🔒

Security headers - what they are and how to use them 🔒

2
Comments
3 min read
DevOps vs DevSecOps: The Debate

DevOps vs DevSecOps: The Debate

4
Comments
10 min read
Credentials Leak with Knex

Credentials Leak with Knex

2
Comments
7 min read
loading...