DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

57
Comments 14
3 min read
Clarifying Authentication and Authorization with Lupe Fiasco

Clarifying Authentication and Authorization with Lupe Fiasco

3
Comments 1
2 min read
How my car insurance exposed my position

How my car insurance exposed my position

4
Comments 8
7 min read
Don't Click That Google Docs Link: An Overview of The Google Docs Phish Going Around Today

Don't Click That Google Docs Link: An Overview of The Google Docs Phish Going Around Today

7
Comments
3 min read
Authentication Best Practices in REST and GraphQL APIs

Authentication Best Practices in REST and GraphQL APIs

7
Comments
8 min read
Seven Easy Ways to Protect Your WordPress Site

Seven Easy Ways to Protect Your WordPress Site

2
Comments
4 min read
Capture the Flag: It's a game for hack...I mean security professionals

Capture the Flag: It's a game for hack...I mean security professionals

59
Comments 9
10 min read
Fully Remove Zoom from your Mac

Fully Remove Zoom from your Mac

6
Comments
3 min read
Jupyter notebook to check software for CVE vulnerabilities

Jupyter notebook to check software for CVE vulnerabilities

3
Comments
1 min read
From Cloud Security Alert to Open Source Bugfix

From Cloud Security Alert to Open Source Bugfix

9
Comments
4 min read
Hackers Exploit Two-factor Authentication to Steal Millions and How to Fix It

Hackers Exploit Two-factor Authentication to Steal Millions and How to Fix It

3
Comments
5 min read
Istio Service Mesh in 2020: Envoy In, Control Plane Simplified

Istio Service Mesh in 2020: Envoy In, Control Plane Simplified

6
Comments
4 min read
Know Your Privacy Rights: What Devices And Web Apps Are Hiding From You

Know Your Privacy Rights: What Devices And Web Apps Are Hiding From You

2
Comments
9 min read
Lessons learned while working on large-scale server software

Lessons learned while working on large-scale server software

26
Comments
2 min read
Defense Against the Dark Arts: CSRF Attacks

Defense Against the Dark Arts: CSRF Attacks

60
Comments 14
1 min read
Enviorment variables to keep your app safe

Enviorment variables to keep your app safe

5
Comments
2 min read
Unfolding & Sugar Coating for Kubernetes RBAC

Unfolding & Sugar Coating for Kubernetes RBAC

6
Comments
2 min read
Interferencias, privacy activism

Interferencias, privacy activism

2
Comments 3
1 min read
Sorry, I hacked you.

Sorry, I hacked you.

12
Comments 7
3 min read
How to scan your AWS account for old access keys using python

How to scan your AWS account for old access keys using python

5
Comments
3 min read
What's the best way to connect to an machine behind CGNAT.

What's the best way to connect to an machine behind CGNAT.

7
Comments
1 min read
Analizando un método de bypass de sistemas WAF

Analizando un método de bypass de sistemas WAF

5
Comments
2 min read
The Root Cause of Input-Based Security Vulnerabilities – Don’t Fear the Grammar

The Root Cause of Input-Based Security Vulnerabilities – Don’t Fear the Grammar

8
Comments
3 min read
NKN SDK: powering client side communication without servers

NKN SDK: powering client side communication without servers

6
Comments
3 min read
7 Web Application Security Best Practices You Need to Know

7 Web Application Security Best Practices You Need to Know

7
Comments
1 min read
loading...