DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Invalidate JWT Tokens Without Collecting Tokens

How to Invalidate JWT Tokens Without Collecting Tokens

99
Comments 29
3 min read
Integrating Keycloak Identity Management in the Frontend and Backend

Integrating Keycloak Identity Management in the Frontend and Backend

4
Comments
4 min read
How to use Laravel Session

How to use Laravel Session

12
Comments
3 min read
How to use Azure pipelines for automatic certificate renewal

How to use Azure pipelines for automatic certificate renewal

2
Comments
6 min read
Managing and sharing secrets in a Git repository with Keybase

Managing and sharing secrets in a Git repository with Keybase

2
Comments
4 min read
Secure Smart Contract Tools—An End-to-End Developer’s Guide

Secure Smart Contract Tools—An End-to-End Developer’s Guide

4
Comments
7 min read
Verifying data integrity with KMS asymmetric keys

Verifying data integrity with KMS asymmetric keys

6
Comments
8 min read
Microsoft Defender for DevOps (Preview)

Microsoft Defender for DevOps (Preview)

2
Comments
6 min read
9 Things to Consider When Choosing an SCA Tool

9 Things to Consider When Choosing an SCA Tool

3
Comments 1
7 min read
Roles and Permissions in Plain English

Roles and Permissions in Plain English

5
Comments
5 min read
Network Access Control Lists vs Security Groups

Network Access Control Lists vs Security Groups

4
Comments
6 min read
Multi-tenant Security Implementation

Multi-tenant Security Implementation

5
Comments 1
6 min read
AWS Inspector for AWS Lambda

AWS Inspector for AWS Lambda

7
Comments
4 min read
Ruby on Rails Security: 8 Best Practices

Ruby on Rails Security: 8 Best Practices

Comments
6 min read
SAST Autofix

SAST Autofix

5
Comments
3 min read
Web Security 101 - Part 1: Secrets

Web Security 101 - Part 1: Secrets

165
Comments 8
6 min read
Using ZTNA to Secure Your APIs

Using ZTNA to Secure Your APIs

3
Comments 1
4 min read
Bicep: Create IoT Hub and Storage routing with private endpoint

Bicep: Create IoT Hub and Storage routing with private endpoint

3
Comments
6 min read
Fixing the firewall with UFW for Amazon EC2 (when you accidentally blocked port 22)

Fixing the firewall with UFW for Amazon EC2 (when you accidentally blocked port 22)

4
Comments
3 min read
Scan Your AWS Lambda Functions with Amazon Inspector

Scan Your AWS Lambda Functions with Amazon Inspector

10
Comments
3 min read
Improving your CI/CD Pipeline: Helm Charts Security Scanning with Trivy and GitHub Actions

Improving your CI/CD Pipeline: Helm Charts Security Scanning with Trivy and GitHub Actions

3
Comments
5 min read
Adding Django Admin Panel MFA to an Existing Project

Adding Django Admin Panel MFA to an Existing Project

3
Comments
6 min read
How attackers use exposed Prometheus server to exploit Kubernetes clusters

How attackers use exposed Prometheus server to exploit Kubernetes clusters

6
Comments
12 min read
Open-source tool enables fuzz testing in JUnit

Open-source tool enables fuzz testing in JUnit

3
Comments
6 min read
What is a VPN?

What is a VPN?

2
Comments
1 min read
Stop Comparing JWT vs Cookies

Stop Comparing JWT vs Cookies

10
Comments
9 min read
Apache Commons Text RCE Vulnerability Analysis - CVE-2022-42889

Apache Commons Text RCE Vulnerability Analysis - CVE-2022-42889

5
Comments
3 min read
Amazon Inspector can now scan AWS Lambda Functions

Amazon Inspector can now scan AWS Lambda Functions

13
Comments 5
3 min read
Web Security 101 - Part 2: User Input

Web Security 101 - Part 2: User Input

32
Comments 1
7 min read
Permissions (access control) in web apps

Permissions (access control) in web apps

38
Comments 2
15 min read
A Virus That Hates .dll Files

A Virus That Hates .dll Files

7
Comments
2 min read
🤖 ED-209 BOT is coming (for you)

🤖 ED-209 BOT is coming (for you)

4
Comments 2
1 min read
How to setup Metasploitable in a Mac with M1 chip

How to setup Metasploitable in a Mac with M1 chip

55
Comments 8
5 min read
Catastrophic backtracking: how can a regular expression cause a ReDoS vulnerability?

Catastrophic backtracking: how can a regular expression cause a ReDoS vulnerability?

10
Comments 2
9 min read
What is SQL Injection and How to prevent it?

What is SQL Injection and How to prevent it?

11
Comments 1
10 min read
AWS Resource Explorer

AWS Resource Explorer

1
Comments
2 min read
Secure Kubernetes with Kubescape

Secure Kubernetes with Kubescape

2
Comments
10 min read
How to hack simple smart contract in the TON blockchain

How to hack simple smart contract in the TON blockchain

6
Comments 1
13 min read
User Authentication Techniques - Authenticating User Accounts

User Authentication Techniques - Authenticating User Accounts

Comments
4 min read
The Dark Side of Permits (EIP2612)

The Dark Side of Permits (EIP2612)

1
Comments
9 min read
How to Secure a Spring Rest Service using Spring Aspect

How to Secure a Spring Rest Service using Spring Aspect

3
Comments 1
4 min read
Secure Shell Protocol – Everything you need to know

Secure Shell Protocol – Everything you need to know

3
Comments
6 min read
Encode, Encrypt, and Hash

Encode, Encrypt, and Hash

6
Comments
2 min read
Securing a new AWS account - Starting with Trusted Advisor

Securing a new AWS account - Starting with Trusted Advisor

2
Comments
12 min read
The impact of open source on cybersecurity

The impact of open source on cybersecurity

6
Comments 1
1 min read
Trusted self-signed TLS certificates for dummies (w/ thorough explanations included)

Trusted self-signed TLS certificates for dummies (w/ thorough explanations included)

9
Comments
11 min read
Interesting middlewares in Node.js and Express.js API for security

Interesting middlewares in Node.js and Express.js API for security

16
Comments
1 min read
Passwordless Authentication with WebAuthn

Passwordless Authentication with WebAuthn

6
Comments
2 min read
Automatic request validation at the edge with OpenAPI and Fastly

Automatic request validation at the edge with OpenAPI and Fastly

10
Comments
5 min read
React Security Vulnerabilities & Best Practices to Avoid Them

React Security Vulnerabilities & Best Practices to Avoid Them

1
Comments
7 min read
Privacy tools for the information age 🔐

Privacy tools for the information age 🔐

5
Comments 1
8 min read
List deleted secrets from AWS Secrets Manager

List deleted secrets from AWS Secrets Manager

6
Comments
2 min read
Mass Assignment Vulnerabilities and Validation in Laravel

Mass Assignment Vulnerabilities and Validation in Laravel

8
Comments
8 min read
Environment Variables in Node.js

Environment Variables in Node.js

1
Comments
5 min read
API Key Leaks

API Key Leaks

15
Comments
3 min read
Doppler Encrypted Secrets Snapshots for High Availability

Doppler Encrypted Secrets Snapshots for High Availability

4
Comments
3 min read
State of Kubernetes Secrets Management in 2022

State of Kubernetes Secrets Management in 2022

3
Comments
10 min read
Using a Random Forest Model for Fraud Detection in Confidential Computing

Using a Random Forest Model for Fraud Detection in Confidential Computing

8
Comments
5 min read
Secure Breast Cancer Identification with Enclaves

Secure Breast Cancer Identification with Enclaves

6
Comments
6 min read
Harden Your Website With Traefik And Security Headers

Harden Your Website With Traefik And Security Headers

5
Comments
7 min read
loading...