DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protect Your System from Install Scripts in npm packages

Protect Your System from Install Scripts in npm packages

2
Comments
2 min read
Cibersecurity, construindo um firewall humano.

Cibersecurity, construindo um firewall humano.

4
Comments 3
5 min read
You need to implement this email check

You need to implement this email check

1
Comments
3 min read
How to secure a web server (VPS)

How to secure a web server (VPS)

2
Comments
8 min read
Don't Skimp on Security: Add These Must-Have Features to Your Web Apps

Don't Skimp on Security: Add These Must-Have Features to Your Web Apps

4
Comments 2
9 min read
Preventing Installing Composer Dependencies with Known Security Vulnerabilities

Preventing Installing Composer Dependencies with Known Security Vulnerabilities

6
Comments
4 min read
AWS Create Bastion Host to communicate with your Private Subnet

AWS Create Bastion Host to communicate with your Private Subnet

1
Comments
4 min read
AWS Security Stories #04.3: OWASP - XSS

AWS Security Stories #04.3: OWASP - XSS

Comments
4 min read
What is the ideal session timeout?

What is the ideal session timeout?

1
Comments 1
1 min read
How To Manually Verify x509 Certificate Chains in .NET

How To Manually Verify x509 Certificate Chains in .NET

7
Comments 1
7 min read
AWS Security Stories #04.2: OWASP - SSRF

AWS Security Stories #04.2: OWASP - SSRF

3
Comments
4 min read
AWS Security Stories #04.1: OWASP - CSRF

AWS Security Stories #04.1: OWASP - CSRF

8
Comments
4 min read
What to Expect in Web Development and JavaScript during 2023 - Trends and Technologies

What to Expect in Web Development and JavaScript during 2023 - Trends and Technologies

9
Comments 1
14 min read
Assign a free SSL certificate to an nginx server with certbot

Assign a free SSL certificate to an nginx server with certbot

1
Comments
1 min read
Enabling logs and alerting in AWS EKS cluster - CloudWatch Log Insights and Metric filters

Enabling logs and alerting in AWS EKS cluster - CloudWatch Log Insights and Metric filters

4
Comments
6 min read
Enable RenovateBot for Azure Pipelines

Enable RenovateBot for Azure Pipelines

1
Comments
3 min read
Why Do We Need Authorization and Authentication? 🔑

Why Do We Need Authorization and Authentication? 🔑

285
Comments 19
8 min read
3 reasons why any website's security is important

3 reasons why any website's security is important

4
Comments
4 min read
Your AWS EC2 Has Been Hacked. What Will Happen Now?

Your AWS EC2 Has Been Hacked. What Will Happen Now?

7
Comments
5 min read
Simple XSS Prevention Method in Javascript

Simple XSS Prevention Method in Javascript

4
Comments
3 min read
Privacy-Preserving Machine Learning with AIJack - 3: Federated Learning with Paillier Encryption on PyTorch

Privacy-Preserving Machine Learning with AIJack - 3: Federated Learning with Paillier Encryption on PyTorch

Comments
3 min read
The true impact of technical debt

The true impact of technical debt

2
Comments
6 min read
Tips for Passing AWS Certification Exams Like a Boss

Tips for Passing AWS Certification Exams Like a Boss

Comments
13 min read
AI generated code creates a new security attack vector

AI generated code creates a new security attack vector

12
Comments 17
1 min read
Ultimate Review of GitHub-related "fackups" in 2022

Ultimate Review of GitHub-related "fackups" in 2022

3
Comments
11 min read
Rust's impact on security (Why the NSA, Microsoft CTO, and Linux recommend it as the safer choice over C and C++)

Rust's impact on security (Why the NSA, Microsoft CTO, and Linux recommend it as the safer choice over C and C++)

7
Comments 3
9 min read
CORS for babies 👶

CORS for babies 👶

4
Comments 1
1 min read
Verifying requests from Slack - The CORRECT method for Node.js

Verifying requests from Slack - The CORRECT method for Node.js

3
Comments
5 min read
Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Comments
2 min read
How to choose an Authorization Service?

How to choose an Authorization Service?

4
Comments
5 min read
Analisando projetos Flutter/Dart com Veracode

Analisando projetos Flutter/Dart com Veracode

3
Comments
5 min read
Validação de PR no Azure DevOps

Validação de PR no Azure DevOps

1
Comments
2 min read
Importação de falhas para o Azure Boards

Importação de falhas para o Azure Boards

1
Comments
3 min read
O que é SCA?

O que é SCA?

2
Comments
3 min read
The Everything Guide to Data Collection in DevSecOps

The Everything Guide to Data Collection in DevSecOps

1
Comments
8 min read
Privacy-Preserving Machine Learning with AIJack - 2: Model Inversion Attack against Federated Learning on PyTorch

Privacy-Preserving Machine Learning with AIJack - 2: Model Inversion Attack against Federated Learning on PyTorch

2
Comments
4 min read
How to Prevent Bots From Submitting Forms

How to Prevent Bots From Submitting Forms

17
Comments 9
2 min read
Pipeline Scan

Pipeline Scan

3
Comments
2 min read
AWS Security Hub Guidebook - Unwinding security concerns

AWS Security Hub Guidebook - Unwinding security concerns

4
Comments
5 min read
Secretlint 6: masking API tokens in .bash_history and .zsh_history

Secretlint 6: masking API tokens in .bash_history and .zsh_history

1
Comments
4 min read
OpenBSD フルディスク暗号化 (on VirtualBox)

OpenBSD フルディスク暗号化 (on VirtualBox)

1
Comments
2 min read
Cybersecurity 101 - Part 1

Cybersecurity 101 - Part 1

3
Comments
4 min read
how to install assetfinder tool on any linunx distro 🐧

how to install assetfinder tool on any linunx distro 🐧

4
Comments
1 min read
Passwords in SQL-Server C#

Passwords in SQL-Server C#

6
Comments
3 min read
Top 5 Featured DEV Tag(#security) Posts from the year 2022

Top 5 Featured DEV Tag(#security) Posts from the year 2022

8
Comments 2
2 min read
Introducing Secweb security headers for fastapi and starlette framework

Introducing Secweb security headers for fastapi and starlette framework

4
Comments
2 min read
BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

6
Comments
3 min read
Software Supply Chain Security Leadership Series: Measuring SBOM Quality

Software Supply Chain Security Leadership Series: Measuring SBOM Quality

3
Comments
1 min read
Blockchain: from A to Z in 10 minutes for future Smart Contract Engineers

Blockchain: from A to Z in 10 minutes for future Smart Contract Engineers

9
Comments 4
13 min read
What is a cookie, and what are they used for?

What is a cookie, and what are they used for?

55
Comments 19
3 min read
Complete Guide on OAuth 2.0 Reference tokens in Asp.Net Core 7 Using Openiddict

Complete Guide on OAuth 2.0 Reference tokens in Asp.Net Core 7 Using Openiddict

12
Comments 1
7 min read
Running graphic apps in Docker: AWS WorkSpaces

Running graphic apps in Docker: AWS WorkSpaces

7
Comments
3 min read
Weird Phishing attempt on GitHub

Weird Phishing attempt on GitHub

2
Comments 2
2 min read
Code Smell 189 - Not Sanitized Input

Code Smell 189 - Not Sanitized Input

8
Comments 2
2 min read
🛡️ Virtual Protection 101🔒: Managing Users, Groups, and Firewalls🔥 in Ubuntu 💻

🛡️ Virtual Protection 101🔒: Managing Users, Groups, and Firewalls🔥 in Ubuntu 💻

3
Comments
4 min read
Auth0: implementing a device flow in a Console Application with .NET 7 - Part 2

Auth0: implementing a device flow in a Console Application with .NET 7 - Part 2

2
Comments
2 min read
Auth0: implementing a device flow in a Console Application with .NET 7

Auth0: implementing a device flow in a Console Application with .NET 7

3
Comments
3 min read
What is JWT(JSON WEB TOKEN) & how it works

What is JWT(JSON WEB TOKEN) & how it works

3
Comments
3 min read
Monitor Your Cloud Environment with AWS Trusted Advisor ☁️

Monitor Your Cloud Environment with AWS Trusted Advisor ☁️

12
Comments
4 min read
What is Identity and Access Management(IAM) Service ?

What is Identity and Access Management(IAM) Service ?

1
Comments
1 min read
loading...