DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
You've leaked a secret in your git repository - now what?

You've leaked a secret in your git repository - now what?

1
Comments 2
12 min read
Which Authentication Method Would You Choose for Your Website in 2025?

Which Authentication Method Would You Choose for Your Website in 2025?

Comments 1
2 min read
MongoDB Access Control: Creating Secure Users with Custom Roles

MongoDB Access Control: Creating Secure Users with Custom Roles

1
Comments 1
3 min read
AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

1
Comments 1
2 min read
Why I Quit Development to Break Into Cybersecurity

Why I Quit Development to Break Into Cybersecurity

63
Comments 17
4 min read
Web Application Threat Hunting!

Web Application Threat Hunting!

6
Comments
1 min read
DevOpsDays Prague 2025

DevOpsDays Prague 2025

15
Comments 6
4 min read
How to Secure a Website with a Free SSL Certificate (Let's Encrypt)

How to Secure a Website with a Free SSL Certificate (Let's Encrypt)

Comments
4 min read
🔐 How to Remove Access Keys from Your AWS Root Account

🔐 How to Remove Access Keys from Your AWS Root Account

2
Comments
2 min read
Melhores práticas de segurança com o GitHub Copilot

Melhores práticas de segurança com o GitHub Copilot

7
Comments
3 min read
5 Prompts That Make Any AI App More Secure

5 Prompts That Make Any AI App More Secure

16
Comments 1
3 min read
Digital Defense Revolution: How Modern Security Landscapes Are Transforming in 2025

Digital Defense Revolution: How Modern Security Landscapes Are Transforming in 2025

5
Comments 1
7 min read
Securing Microservices with JWT Validation at the Nginx Proxy Layer

Securing Microservices with JWT Validation at the Nginx Proxy Layer

5
Comments
5 min read
Social Media Widgets and Privacy

Social Media Widgets and Privacy

12
Comments 3
5 min read
The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

4
Comments 2
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.