DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Microsoft Defender for DevOps (Preview)

Microsoft Defender for DevOps (Preview)

2
Comments
6 min read
9 Things to Consider When Choosing an SCA Tool

9 Things to Consider When Choosing an SCA Tool

3
Comments 1
7 min read
Roles and Permissions in Plain English

Roles and Permissions in Plain English

5
Comments
5 min read
Network Access Control Lists vs Security Groups

Network Access Control Lists vs Security Groups

4
Comments
6 min read
Multi-tenant Security Implementation

Multi-tenant Security Implementation

5
Comments 1
6 min read
AWS Inspector for AWS Lambda

AWS Inspector for AWS Lambda

7
Comments
4 min read
Ruby on Rails Security: 8 Best Practices

Ruby on Rails Security: 8 Best Practices

Comments
6 min read
SAST Autofix

SAST Autofix

5
Comments
3 min read
Web Security 101 - Part 1: Secrets

Web Security 101 - Part 1: Secrets

165
Comments 8
6 min read
Using ZTNA to Secure Your APIs

Using ZTNA to Secure Your APIs

3
Comments 1
4 min read
Bicep: Create IoT Hub and Storage routing with private endpoint

Bicep: Create IoT Hub and Storage routing with private endpoint

3
Comments
6 min read
Fixing the firewall with UFW for Amazon EC2 (when you accidentally blocked port 22)

Fixing the firewall with UFW for Amazon EC2 (when you accidentally blocked port 22)

4
Comments
3 min read
Scan Your AWS Lambda Functions with Amazon Inspector

Scan Your AWS Lambda Functions with Amazon Inspector

10
Comments
3 min read
Improving your CI/CD Pipeline: Helm Charts Security Scanning with Trivy and GitHub Actions

Improving your CI/CD Pipeline: Helm Charts Security Scanning with Trivy and GitHub Actions

3
Comments
5 min read
Adding Django Admin Panel MFA to an Existing Project

Adding Django Admin Panel MFA to an Existing Project

3
Comments
6 min read
How attackers use exposed Prometheus server to exploit Kubernetes clusters

How attackers use exposed Prometheus server to exploit Kubernetes clusters

6
Comments
12 min read
Open-source tool enables fuzz testing in JUnit

Open-source tool enables fuzz testing in JUnit

3
Comments
6 min read
What is a VPN?

What is a VPN?

2
Comments
1 min read
Stop Comparing JWT vs Cookies

Stop Comparing JWT vs Cookies

10
Comments
9 min read
Apache Commons Text RCE Vulnerability Analysis - CVE-2022-42889

Apache Commons Text RCE Vulnerability Analysis - CVE-2022-42889

5
Comments
3 min read
Amazon Inspector can now scan AWS Lambda Functions

Amazon Inspector can now scan AWS Lambda Functions

13
Comments 5
3 min read
Web Security 101 - Part 2: User Input

Web Security 101 - Part 2: User Input

32
Comments 1
7 min read
Permissions (access control) in web apps

Permissions (access control) in web apps

38
Comments 2
15 min read
A Virus That Hates .dll Files

A Virus That Hates .dll Files

7
Comments
2 min read
🤖 ED-209 BOT is coming (for you)

🤖 ED-209 BOT is coming (for you)

4
Comments 2
1 min read
How to setup Metasploitable in a Mac with M1 chip

How to setup Metasploitable in a Mac with M1 chip

62
Comments 8
5 min read
Catastrophic backtracking: how can a regular expression cause a ReDoS vulnerability?

Catastrophic backtracking: how can a regular expression cause a ReDoS vulnerability?

10
Comments 2
9 min read
What is SQL Injection and How to prevent it?

What is SQL Injection and How to prevent it?

11
Comments 1
10 min read
AWS Resource Explorer

AWS Resource Explorer

1
Comments
2 min read
Secure Kubernetes with Kubescape

Secure Kubernetes with Kubescape

2
Comments
10 min read
How to hack simple smart contract in the TON blockchain

How to hack simple smart contract in the TON blockchain

7
Comments 1
13 min read
User Authentication Techniques - Authenticating User Accounts

User Authentication Techniques - Authenticating User Accounts

Comments
4 min read
The Dark Side of Permits (EIP2612)

The Dark Side of Permits (EIP2612)

1
Comments
9 min read
How to Secure a Spring Rest Service using Spring Aspect

How to Secure a Spring Rest Service using Spring Aspect

3
Comments 1
4 min read
Secure Shell Protocol – Everything you need to know

Secure Shell Protocol – Everything you need to know

3
Comments
6 min read
Encode, Encrypt, and Hash

Encode, Encrypt, and Hash

6
Comments
2 min read
Securing a new AWS account - Starting with Trusted Advisor

Securing a new AWS account - Starting with Trusted Advisor

2
Comments
12 min read
The impact of open source on cybersecurity

The impact of open source on cybersecurity

6
Comments 1
1 min read
Trusted self-signed TLS certificates for dummies (w/ thorough explanations included)

Trusted self-signed TLS certificates for dummies (w/ thorough explanations included)

10
Comments
11 min read
Interesting middlewares in Node.js and Express.js API for security

Interesting middlewares in Node.js and Express.js API for security

16
Comments
1 min read
Passwordless Authentication with WebAuthn

Passwordless Authentication with WebAuthn

6
Comments
2 min read
Automatic request validation at the edge with OpenAPI and Fastly

Automatic request validation at the edge with OpenAPI and Fastly

10
Comments
5 min read
React Security Vulnerabilities & Best Practices to Avoid Them

React Security Vulnerabilities & Best Practices to Avoid Them

1
Comments
7 min read
Privacy tools for the information age 🔐

Privacy tools for the information age 🔐

5
Comments 1
8 min read
List deleted secrets from AWS Secrets Manager

List deleted secrets from AWS Secrets Manager

6
Comments
2 min read
Mass Assignment Vulnerabilities and Validation in Laravel

Mass Assignment Vulnerabilities and Validation in Laravel

8
Comments
8 min read
Environment Variables in Node.js

Environment Variables in Node.js

1
Comments
5 min read
API Key Leaks

API Key Leaks

15
Comments
3 min read
Doppler Encrypted Secrets Snapshots for High Availability

Doppler Encrypted Secrets Snapshots for High Availability

4
Comments
3 min read
State of Kubernetes Secrets Management in 2022

State of Kubernetes Secrets Management in 2022

3
Comments
10 min read
Using a Random Forest Model for Fraud Detection in Confidential Computing

Using a Random Forest Model for Fraud Detection in Confidential Computing

8
Comments
5 min read
Secure Breast Cancer Identification with Enclaves

Secure Breast Cancer Identification with Enclaves

6
Comments
6 min read
Harden Your Website With Traefik And Security Headers

Harden Your Website With Traefik And Security Headers

5
Comments
7 min read
All your JavaScript code is polluted

All your JavaScript code is polluted

185
Comments 16
2 min read
A quick comparison of Security Static Code Analyzers for C#

A quick comparison of Security Static Code Analyzers for C#

9
Comments 3
14 min read
Case Study: Connecting Azure AD SSO with AWS

Case Study: Connecting Azure AD SSO with AWS

2
Comments
5 min read
What Every Developer Should Know About Data Security/Privacy

What Every Developer Should Know About Data Security/Privacy

4
Comments 1
6 min read
Top 7 websites to learn secure code development faster

Top 7 websites to learn secure code development faster

7
Comments
2 min read
Why Startups Suck at Security

Why Startups Suck at Security

10
Comments 2
1 min read
Drop those credentials, use Single-Sign-On Login instead

Drop those credentials, use Single-Sign-On Login instead

23
Comments 4
8 min read
loading...