DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Level up your secrets management in Kubernetes using AWS Secret Manager and Helm

Level up your secrets management in Kubernetes using AWS Secret Manager and Helm

4
Comments
3 min read
How to implement CAPTCHAs or reCAPTCHAs?

How to implement CAPTCHAs or reCAPTCHAs?

28
Comments 4
5 min read
RBAC vs ReBAC: When to use them

RBAC vs ReBAC: When to use them

41
Comments 4
5 min read
SSL Certificates - an easy to understand guide

SSL Certificates - an easy to understand guide

7
Comments
5 min read
Semgrep Writing Rule Tutorial (DOM-Based XSS)

Semgrep Writing Rule Tutorial (DOM-Based XSS)

1
Comments
7 min read
Developers Guide to DevSecOps

Developers Guide to DevSecOps

25
Comments
8 min read
Security state of the Azure DevOps Marketplace

Security state of the Azure DevOps Marketplace

1
Comments
27 min read
Biz s++ o'rganishni boshladik.

Biz s++ o'rganishni boshladik.

6
Comments 1
7 min read
Utilizando Metasploit, resumo básico do funcionamento.

Utilizando Metasploit, resumo básico do funcionamento.

6
Comments
4 min read
How to test the performance of your GraphQL applications?

How to test the performance of your GraphQL applications?

7
Comments 1
3 min read
The Importance of Internal Cloud Security Standards

The Importance of Internal Cloud Security Standards

7
Comments 2
4 min read
Como criar uma Service Connection

Como criar uma Service Connection

2
Comments
1 min read
Como adicionar SAST e SCA em uma validação de PR?

Como adicionar SAST e SCA em uma validação de PR?

4
Comments
5 min read
Configurando o arquivo de credenciais

Configurando o arquivo de credenciais

9
Comments
2 min read
Enrich Splunk events with Steampipe

Enrich Splunk events with Steampipe

3
Comments
6 min read
Why is char[] preferred over String for passwords in Java ?

Why is char[] preferred over String for passwords in Java ?

5
Comments
1 min read
Unleashing the Power of Kubernetes 1.26: Exploring the New ValidatingAdmissionPolicy Feature with CEL

Unleashing the Power of Kubernetes 1.26: Exploring the New ValidatingAdmissionPolicy Feature with CEL

3
Comments
7 min read
Top Cloud Secret Management Tools and How To Choose the Right One

Top Cloud Secret Management Tools and How To Choose the Right One

6
Comments
18 min read
Awesome Posts from last week tagged(#security)

Awesome Posts from last week tagged(#security)

4
Comments 2
2 min read
Authorize Users Like a Pro: Libraries That Help You Implement Access Control With Node.js

Authorize Users Like a Pro: Libraries That Help You Implement Access Control With Node.js

42
Comments 5
9 min read
5 Pro Tips to secure WordPress from hacking

5 Pro Tips to secure WordPress from hacking

2
Comments 1
6 min read
Security analysis of a repository pattern and asking ChatGPT about it.

Security analysis of a repository pattern and asking ChatGPT about it.

2
Comments
3 min read
'; SQL_Injection ( ) ;--

'; SQL_Injection ( ) ;--

6
Comments 2
7 min read
⌛ Manage EoLs like a boss with endoflife.date 🛑

⌛ Manage EoLs like a boss with endoflife.date 🛑

16
Comments 10
3 min read
Desenho de implementação de pipeline

Desenho de implementação de pipeline

3
Comments
2 min read
AWS multi-account strategy explained

AWS multi-account strategy explained

5
Comments
7 min read
How to Securely Store Passwords with GPG & PASS

How to Securely Store Passwords with GPG & PASS

6
Comments
4 min read
Exploring the Spring Security authorization bypass (CVE-2022-31692)

Exploring the Spring Security authorization bypass (CVE-2022-31692)

Comments
5 min read
What is Policy as Code?

What is Policy as Code?

Comments
3 min read
Criando um bloqueador de IP com python

Criando um bloqueador de IP com python

1
Comments
1 min read
All You Should Know About Netwalker Ransomware

All You Should Know About Netwalker Ransomware

2
Comments
15 min read
pedumper: A new tool for dumping PE files

pedumper: A new tool for dumping PE files

Comments
1 min read
Métodos de segurança em API

Métodos de segurança em API

5
Comments
2 min read
OpenBSD Full Disk Encryption (on VirtualBox)

OpenBSD Full Disk Encryption (on VirtualBox)

1
Comments
4 min read
All You Need to Know About FIDO2 & Passwordless Authentication

All You Need to Know About FIDO2 & Passwordless Authentication

13
Comments 4
5 min read
Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471)

Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471)

4
Comments
5 min read
How JWTs Could Be Dangerous and Its Alternatives

How JWTs Could Be Dangerous and Its Alternatives

235
Comments 25
5 min read
Avoid configuration drift on your terraform state when using aws_security_group

Avoid configuration drift on your terraform state when using aws_security_group

4
Comments 1
4 min read
WordPress (plugins) compatibility check to prevent fatal errors

WordPress (plugins) compatibility check to prevent fatal errors

13
Comments 4
9 min read
How to Scrape Tweets from Twitter with Python using Tweeds

How to Scrape Tweets from Twitter with Python using Tweeds

7
Comments 3
2 min read
A Guide To Privacy Part 1

A Guide To Privacy Part 1

3
Comments 2
3 min read
A Guide To Digital Privacy Part 2

A Guide To Digital Privacy Part 2

3
Comments 1
5 min read
How to steal a website and how to prevent it

How to steal a website and how to prevent it

9
Comments 2
4 min read
Automatic SSO in Kubernetes workloads using a sidecar container

Automatic SSO in Kubernetes workloads using a sidecar container

20
Comments 1
3 min read
Getting Started In Cyber security - A 2023 Guide

Getting Started In Cyber security - A 2023 Guide

4
Comments
4 min read
Securing your NextJS Web Application with AWS Amplify and Cognito

Securing your NextJS Web Application with AWS Amplify and Cognito

6
Comments
2 min read
A Deep Dive into Introduction to Computer Networking

A Deep Dive into Introduction to Computer Networking

4
Comments
9 min read
Invalidating JSON Web Tokens (JWT) the Right Way

Invalidating JSON Web Tokens (JWT) the Right Way

2
Comments
4 min read
Kubernetes: ServiceAccount with AWS IAM Role for Kubernetes Pod

Kubernetes: ServiceAccount with AWS IAM Role for Kubernetes Pod

2
Comments
5 min read
AWS re:Invent 2022: Security Session Notes đź“ť

AWS re:Invent 2022: Security Session Notes đź“ť

5
Comments
5 min read
Using secrets stored in AWS Secrets Manager as environment variables for ECS container definitions. With Terraform.

Using secrets stored in AWS Secrets Manager as environment variables for ECS container definitions. With Terraform.

12
Comments
4 min read
What is Subnet on AWS VPC?

What is Subnet on AWS VPC?

10
Comments
2 min read
Better two factor authentication experiences with WebOTP

Better two factor authentication experiences with WebOTP

52
Comments 14
5 min read
How to Invalidate JWT Tokens Without Collecting Tokens

How to Invalidate JWT Tokens Without Collecting Tokens

100
Comments 29
3 min read
Integrating Keycloak Identity Management in the Frontend and Backend

Integrating Keycloak Identity Management in the Frontend and Backend

4
Comments
4 min read
How to use Laravel Session

How to use Laravel Session

12
Comments
3 min read
How to use Azure pipelines for automatic certificate renewal

How to use Azure pipelines for automatic certificate renewal

2
Comments
6 min read
Managing and sharing secrets in a Git repository with Keybase

Managing and sharing secrets in a Git repository with Keybase

2
Comments
4 min read
Secure Smart Contract Tools—An End-to-End Developer’s Guide

Secure Smart Contract Tools—An End-to-End Developer’s Guide

4
Comments
7 min read
Verifying data integrity with KMS asymmetric keys

Verifying data integrity with KMS asymmetric keys

6
Comments
8 min read
loading...