DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What can be done with an IP address?

What can be done with an IP address?

5
Comments 2
4 min read
How !(not) to store passwords

How !(not) to store passwords

2
Comments
15 min read
OWASP | Web Application Penetration Testing

OWASP | Web Application Penetration Testing

2
Comments 1
7 min read
26 AWS Security Best Practices to Adopt in Production

26 AWS Security Best Practices to Adopt in Production

8
Comments
33 min read
How Does WebAuthn Work?

How Does WebAuthn Work?

7
Comments 2
5 min read
Data protection in cloud services

Data protection in cloud services

Comments
4 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

8
Comments
2 min read
Ethernaut: 27. Good Samaritan

Ethernaut: 27. Good Samaritan

Comments
3 min read
How to Create and Configure Your Kubernetes Service Account

How to Create and Configure Your Kubernetes Service Account

3
Comments
6 min read
How I found an S3 vulnerability in a $85 million funded startup and reported it ethically

How I found an S3 vulnerability in a $85 million funded startup and reported it ethically

1
Comments
4 min read
How to virus scan file users upload using ClamAV

How to virus scan file users upload using ClamAV

7
Comments 1
2 min read
Incident Response On AWS

Incident Response On AWS

3
Comments
12 min read
How (not) to store passwords

How (not) to store passwords

21
Comments 13
4 min read
AWS + DevSecops

AWS + DevSecops

13
Comments
6 min read
What is Authorization service and why does it matter?

What is Authorization service and why does it matter?

128
Comments 4
5 min read
You Shall Not Pass: The Ins and Outs of Authentication

You Shall Not Pass: The Ins and Outs of Authentication

6
Comments
7 min read
Update Cheat Sheet for Developers

Update Cheat Sheet for Developers

9
Comments
3 min read
How to Avoid Network Policies Interfering with Workload Identity on the Google Kubernetes Engine

How to Avoid Network Policies Interfering with Workload Identity on the Google Kubernetes Engine

1
Comments
1 min read
Hack AWS S3 — Catch AWS Account!

Hack AWS S3 — Catch AWS Account!

16
Comments 1
3 min read
The best hacking tools in 2022

The best hacking tools in 2022

7
Comments
1 min read
📌 Live - Diving into an NPM Package Vulnerability

📌 Live - Diving into an NPM Package Vulnerability

7
Comments
2 min read
Reading saved firefox passwords via cli and other woes

Reading saved firefox passwords via cli and other woes

6
Comments 1
5 min read
A Bash script to configure Linux

A Bash script to configure Linux

17
Comments
1 min read
8 Actions for Hardening your Linux Server exposed on the internet

8 Actions for Hardening your Linux Server exposed on the internet

73
Comments 8
5 min read
How to Address Sensitive Data Sprawl

How to Address Sensitive Data Sprawl

4
Comments
7 min read
The risks of using vulnerable dependencies in your project, and how SCA helps manage them

The risks of using vulnerable dependencies in your project, and how SCA helps manage them

3
Comments
3 min read
[Ask] For Server linux security is this enough ?

[Ask] For Server linux security is this enough ?

Comments
1 min read
How to log in to multiple AWS accounts — the easy way

How to log in to multiple AWS accounts — the easy way

Comments
3 min read
10 best practices to containerize Node.js web applications with Docker

10 best practices to containerize Node.js web applications with Docker

3
Comments
28 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
Não perca tempo criando sistema de autenticação

Não perca tempo criando sistema de autenticação

9
Comments
3 min read
How Cross-Site Request Forgery Works

How Cross-Site Request Forgery Works

7
Comments
4 min read
Do not use default SAM CloudFormation Role for Production

Do not use default SAM CloudFormation Role for Production

8
Comments 1
5 min read
Spin up secure HTTPS proxy in less than 10 minutes

Spin up secure HTTPS proxy in less than 10 minutes

4
Comments
5 min read
Appwrite Loves Open Source: Why I Chose To Sponsor Offen

Appwrite Loves Open Source: Why I Chose To Sponsor Offen

28
Comments 1
4 min read
RPKI , securing BGP Infrastructure - with Lab

RPKI , securing BGP Infrastructure - with Lab

4
Comments
9 min read
React XSS

React XSS

Comments
4 min read
O JavaScript não é seguro...

O JavaScript não é seguro...

Comments
5 min read
Environment variables & Its best practices

Environment variables & Its best practices

25
Comments 1
4 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

7
Comments
4 min read
Admission Controllers in Action: Datree's Approach

Admission Controllers in Action: Datree's Approach

10
Comments
6 min read
AWS Backup adds Amazon CloudWatch metrics to its console dashboard

AWS Backup adds Amazon CloudWatch metrics to its console dashboard

6
Comments
1 min read
OIDC Forever, IAM Credentials Never!

OIDC Forever, IAM Credentials Never!

35
Comments 6
8 min read
Using Proxychains in JMeter

Using Proxychains in JMeter

20
Comments
8 min read
SIEM VS SOC & HOW SIEM WORKS!!

SIEM VS SOC & HOW SIEM WORKS!!

6
Comments
6 min read
Introduction to User Authentication for Microservices

Introduction to User Authentication for Microservices

10
Comments
5 min read
Debugging generic API Gateway errors with access logs

Debugging generic API Gateway errors with access logs

9
Comments 4
4 min read
OWAST Top 10 vulnerabilities and how to approach them

OWAST Top 10 vulnerabilities and how to approach them

7
Comments
10 min read
How To: Issue Triage via Phylum Extensions

How To: Issue Triage via Phylum Extensions

8
Comments
4 min read
Why does diversity in cybersecurity matter?

Why does diversity in cybersecurity matter?

4
Comments 1
6 min read
Why front end should learn hacking

Why front end should learn hacking

2
Comments
2 min read
Signing XRPL transactions with AWS KMS

Signing XRPL transactions with AWS KMS

12
Comments
5 min read
Is it time to give up GitHub? August Open Source News

Is it time to give up GitHub? August Open Source News

5
Comments
1 min read
Deploying a Landing Zone with AWS Control Tower - Part 1

Deploying a Landing Zone with AWS Control Tower - Part 1

4
Comments
4 min read
Deploying a Landing Zone with AWS Control Tower - Part 2

Deploying a Landing Zone with AWS Control Tower - Part 2

4
Comments
7 min read
We added a few new job categories

We added a few new job categories

2
Comments
1 min read
To-Do List for Your AWS Account

To-Do List for Your AWS Account

61
Comments 6
4 min read
Linux EC2 Bastion Host with AWS CDK

Linux EC2 Bastion Host with AWS CDK

2
Comments
4 min read
How to Backup Outlook Emails and Protect your Data

How to Backup Outlook Emails and Protect your Data

6
Comments
1 min read
Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
loading...