DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Password Managers - The Future of Logins.

Password Managers - The Future of Logins.

19
Comments 3
2 min read
Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Comments
13 min read
Securing Your Application: A Comprehensive Guide for Developers

Securing Your Application: A Comprehensive Guide for Developers

1
Comments
3 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
Open-Source Software Security

Open-Source Software Security

Comments
11 min read
Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

1
Comments
13 min read
Streamlined Guide: Setting Up SSH and GPG Keys on GitHub

Streamlined Guide: Setting Up SSH and GPG Keys on GitHub

1
Comments
3 min read
In pursuit of privacy: What is privacy?

In pursuit of privacy: What is privacy?

7
Comments
3 min read
eBPF: Unleashing Kernel Magic for Modern Infrastructure

eBPF: Unleashing Kernel Magic for Modern Infrastructure

2
Comments 1
5 min read
Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

11
Comments 2
3 min read
Python Security Essentials for Your Apps

Python Security Essentials for Your Apps

8
Comments 5
8 min read
Online Safety: A Guide to Protecting Yourself

Online Safety: A Guide to Protecting Yourself

2
Comments
7 min read
Understanding Metamorphic Code

Understanding Metamorphic Code

6
Comments
4 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

2
Comments
3 min read
Enhance Security for NodeJS Applications

Enhance Security for NodeJS Applications

Comments
5 min read
Trick to get Free SSL certificate for azure application gateway

Trick to get Free SSL certificate for azure application gateway

12
Comments
2 min read
Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

8
Comments
6 min read
Prompt Fuzzer: how to keep your agents on the right path

Prompt Fuzzer: how to keep your agents on the right path

4
Comments
2 min read
Building a Fort: Django Security Best Practices

Building a Fort: Django Security Best Practices

4
Comments
7 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 6
4 min read
HTTP / HTTPS Communication Protocol

HTTP / HTTPS Communication Protocol

5
Comments 2
8 min read
Services that can integrate with AWS Certificate Manager and their Use Case

Services that can integrate with AWS Certificate Manager and their Use Case

3
Comments 2
3 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
AWS Detective

AWS Detective

Comments
2 min read
Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

3
Comments
4 min read
How to Hide the X-Powered-By Header in NestJS

How to Hide the X-Powered-By Header in NestJS

4
Comments 2
1 min read
keepsecret.py: a simple way to encrypt secret files in your repository

keepsecret.py: a simple way to encrypt secret files in your repository

1
Comments
4 min read
De4py: Advanced python reverse engineering

De4py: Advanced python reverse engineering

1
Comments
2 min read
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
Issue 43 of AWS Cloud Security Weekly

Issue 43 of AWS Cloud Security Weekly

4
Comments
2 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

1
Comments
6 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Securing the Cloud #29

Securing the Cloud #29

5
Comments
3 min read
Password Management: Passwordless Login

Password Management: Passwordless Login

10
Comments 2
8 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

Comments
3 min read
The Benefits of Opting Out from Using OfficialUSA.com

The Benefits of Opting Out from Using OfficialUSA.com

1
Comments 1
4 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

6
Comments
9 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Threat Modeling for Developers

Threat Modeling for Developers

24
Comments 2
3 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Frontend Web Security - Protecting Against Common Threats

Frontend Web Security - Protecting Against Common Threats

Comments
2 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

10
Comments
1 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

35
Comments
2 min read
Comparing token-based authentication and session-based authentication

Comparing token-based authentication and session-based authentication

19
Comments 2
4 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

3
Comments
8 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

3
Comments
7 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

2
Comments
5 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
loading...