DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is VPC Flow Log ? How to Enable VPC Log

What is VPC Flow Log ? How to Enable VPC Log

Comments
2 min read
Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Comments
3 min read
Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

4
Comments
3 min read
CSRF Protection in PHP

CSRF Protection in PHP

1
Comments
3 min read
Logs create coziness

Logs create coziness

Comments
2 min read
𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Using Docker for Penetration Testing: A Practical Guide

Using Docker for Penetration Testing: A Practical Guide

4
Comments
3 min read
Trusted publishing ‐ It has never been easier to publish your python packages

Trusted publishing ‐ It has never been easier to publish your python packages

3
Comments
5 min read
What Does a Cyber Security Analyst Do?

What Does a Cyber Security Analyst Do?

Comments
2 min read
AntiCrack-DotNet: Advanced Methods to prevent cracking.

AntiCrack-DotNet: Advanced Methods to prevent cracking.

2
Comments
2 min read
OS Security and Passwords 🔐: Protect Your Digital Universe! 🛡️

OS Security and Passwords 🔐: Protect Your Digital Universe! 🛡️

1
Comments
1 min read
Mseal in Linux: An un-hackable solution?

Mseal in Linux: An un-hackable solution?

1
Comments
3 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Disable password expiration in Windows

Disable password expiration in Windows

Comments
1 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

6
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

5
Comments
5 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

5
Comments
4 min read
End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

8
Comments
1 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

6
Comments
4 min read
Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

1
Comments
4 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

5
Comments
4 min read
Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

4
Comments 1
3 min read
What is CDR?

What is CDR?

Comments
3 min read
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Comments
1 min read
A Definitive Guide to API Pentesting by Sekurno

A Definitive Guide to API Pentesting by Sekurno

7
Comments
10 min read
Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Comments
5 min read
When to Start Secret Rotation

When to Start Secret Rotation

Comments
2 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

8
Comments
4 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

5
Comments
5 min read
Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

13
Comments
4 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

6
Comments
5 min read
Unlocking the Secrets of Authentication: A Human's Guide to Digital Security 🔐

Unlocking the Secrets of Authentication: A Human's Guide to Digital Security 🔐

Comments
5 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
Exploring AWS Networking and Content Delivery Services

Exploring AWS Networking and Content Delivery Services

Comments
3 min read
Wireshark Sniffing: Capturing and Analyzing Network Data Like a Pro

Wireshark Sniffing: Capturing and Analyzing Network Data Like a Pro

Comments
3 min read
Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

1
Comments
3 min read
[Série Auth/Aut] Introduction : l'importance du contrôle d'accès

[Série Auth/Aut] Introduction : l'importance du contrôle d'accès

5
Comments
5 min read
Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

9
Comments 4
5 min read
Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Comments
6 min read
Beyond Shift Left: Transforming Security from Reactive to Proactive Teamwork

Beyond Shift Left: Transforming Security from Reactive to Proactive Teamwork

1
Comments
3 min read
Amazon GuardDuty Extended Threat Detection

Amazon GuardDuty Extended Threat Detection

2
Comments
5 min read
Phishing And Malware - A Practical Dive

Phishing And Malware - A Practical Dive

5
Comments
3 min read
5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments
4 min read
End Of Series: SQL Injection Detect & Defend

End Of Series: SQL Injection Detect & Defend

5
Comments 1
1 min read
Just-in-Time Database Access

Just-in-Time Database Access

5
Comments
2 min read
DevOps: Shift Left for Early Testing and Security

DevOps: Shift Left for Early Testing and Security

Comments
2 min read
Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

5
Comments
3 min read
Part 6: SQL Injection Series: Case Studies and Lessons Learned

Part 6: SQL Injection Series: Case Studies and Lessons Learned

6
Comments
4 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments
2 min read
Part 5: SQL Injection Series: Future Trends and Emerging Challenges

Part 5: SQL Injection Series: Future Trends and Emerging Challenges

5
Comments
4 min read
Linux Security Checkup: Comprehensive Guide to Quick Audit Essentials

Linux Security Checkup: Comprehensive Guide to Quick Audit Essentials

4
Comments
4 min read
Sidecar Containers in Kubernetes

Sidecar Containers in Kubernetes

Comments
7 min read
How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

Comments
11 min read
AWS Centralised Root Access Management : Simplifying Operations

AWS Centralised Root Access Management : Simplifying Operations

4
Comments 1
4 min read
Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

5
Comments
4 min read
Code Smell 282 - Bad Defaults

Code Smell 282 - Bad Defaults

6
Comments
6 min read
A Guide to Root Access for AWS S3 Buckets

A Guide to Root Access for AWS S3 Buckets

1
Comments
3 min read
Wireless Security Configuration: Protect Your Network Now!

Wireless Security Configuration: Protect Your Network Now!

Comments
3 min read
Understanding JWT Authentication: Spring Security's Architecture and Go Implementation

Understanding JWT Authentication: Spring Security's Architecture and Go Implementation

6
Comments
5 min read
loading...