DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Offensive Git Forensics: Flaws.cloud Level3

Offensive Git Forensics: Flaws.cloud Level3

Comments
9 min read
Potential path traversal vulnerability when using File class and its solution

Potential path traversal vulnerability when using File class and its solution

11
Comments
4 min read
Top open source security devtools you need to know about

Top open source security devtools you need to know about

17
Comments 3
3 min read
👨🏻‍💻Securing Your Web Applications from SQL Injection with SQLMap

👨🏻‍💻Securing Your Web Applications from SQL Injection with SQLMap

18
Comments 4
6 min read
Secure Your Next.js Application: Essential Security Practices and Tools

Secure Your Next.js Application: Essential Security Practices and Tools

8
Comments
2 min read
Do you make these small mistakes with HTTP status code?

Do you make these small mistakes with HTTP status code?

2
Comments
5 min read
Understanding JWT-Based Authentication

Understanding JWT-Based Authentication

Comments
3 min read
Secure Deploys from GitHub with the AWS CDK

Secure Deploys from GitHub with the AWS CDK

1
Comments
5 min read
Advanced Credential Rotation for IAM Users with a Grace Period

Advanced Credential Rotation for IAM Users with a Grace Period

6
Comments
6 min read
Top Security Vulnerabilities in React Applications

Top Security Vulnerabilities in React Applications

13
Comments
6 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

15
Comments 1
15 min read
How to discover the user’s IP address using Telegram.

How to discover the user’s IP address using Telegram.

753
Comments 9
4 min read
Como descobrir o endereço IP do usuário usando Telegram.

Como descobrir o endereço IP do usuário usando Telegram.

111
Comments
4 min read
How I saw too much information coming back from a company’s backend

How I saw too much information coming back from a company’s backend

2
Comments
11 min read
Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

Bridging the Gap: Leveraging Secret Store CSI Drivers to Access Secrets from Google Secret Manager in GKE Cluster

8
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.