DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Five Ways Your CI/CD Pipeline Can Be Exploited

Five Ways Your CI/CD Pipeline Can Be Exploited

2
Comments
5 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments 1
2 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
Re-learning security: Encryption, Encoding, Hashing ☄

Re-learning security: Encryption, Encoding, Hashing ☄

Comments
7 min read
Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Comments
10 min read
Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

5
Comments
5 min read
Integrating Azure Secrets into your .NET Web Application

Integrating Azure Secrets into your .NET Web Application

Comments
3 min read
Protect secrets in Git with the clean/smudge filter

Protect secrets in Git with the clean/smudge filter

Comments
4 min read
How to Onboard and Protect Remote Teams with Secure Cloud Environments

How to Onboard and Protect Remote Teams with Secure Cloud Environments

7
Comments 1
5 min read
Comparison between Data Privacy & Data Security

Comparison between Data Privacy & Data Security

Comments
3 min read
pip-audit: Managing pip Vulnerabilities

pip-audit: Managing pip Vulnerabilities

Comments
2 min read
Preventing Multiple Failed Input Attack using Redis and NodeJS

Preventing Multiple Failed Input Attack using Redis and NodeJS

Comments
4 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

7
Comments
17 min read
Redeemer | HackTheBox Write-up

Redeemer | HackTheBox Write-up

12
Comments
3 min read
Methodology: How we discovered over 18,000 API secret tokens

Methodology: How we discovered over 18,000 API secret tokens

Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.