DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Your AWS EC2 Has Been Hacked. What Will Happen Now?

Your AWS EC2 Has Been Hacked. What Will Happen Now?

7
Comments
5 min read
Simple XSS Prevention Method in Javascript

Simple XSS Prevention Method in Javascript

4
Comments
3 min read
Privacy-Preserving Machine Learning with AIJack - 3: Federated Learning with Paillier Encryption on PyTorch

Privacy-Preserving Machine Learning with AIJack - 3: Federated Learning with Paillier Encryption on PyTorch

Comments
3 min read
The true impact of technical debt

The true impact of technical debt

2
Comments
6 min read
Tips for Passing AWS Certification Exams Like a Boss

Tips for Passing AWS Certification Exams Like a Boss

Comments
13 min read
AI generated code creates a new security attack vector

AI generated code creates a new security attack vector

12
Comments 17
1 min read
Ultimate Review of GitHub-related "fackups" in 2022

Ultimate Review of GitHub-related "fackups" in 2022

3
Comments
11 min read
Rust's impact on security (Why the NSA, Microsoft CTO, and Linux recommend it as the safer choice over C and C++)

Rust's impact on security (Why the NSA, Microsoft CTO, and Linux recommend it as the safer choice over C and C++)

7
Comments 3
9 min read
CORS for babies 👶

CORS for babies 👶

4
Comments 1
1 min read
Verifying requests from Slack - The CORRECT method for Node.js

Verifying requests from Slack - The CORRECT method for Node.js

3
Comments
5 min read
Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Comments
2 min read
How to choose an Authorization Service?

How to choose an Authorization Service?

4
Comments
5 min read
Analisando projetos Flutter/Dart com Veracode

Analisando projetos Flutter/Dart com Veracode

3
Comments
5 min read
Validação de PR no Azure DevOps

Validação de PR no Azure DevOps

1
Comments
2 min read
Importação de falhas para o Azure Boards

Importação de falhas para o Azure Boards

1
Comments
3 min read
O que é SCA?

O que é SCA?

2
Comments
3 min read
The Everything Guide to Data Collection in DevSecOps

The Everything Guide to Data Collection in DevSecOps

1
Comments
8 min read
Privacy-Preserving Machine Learning with AIJack - 2: Model Inversion Attack against Federated Learning on PyTorch

Privacy-Preserving Machine Learning with AIJack - 2: Model Inversion Attack against Federated Learning on PyTorch

2
Comments
4 min read
How to Prevent Bots From Submitting Forms

How to Prevent Bots From Submitting Forms

20
Comments 9
2 min read
Pipeline Scan

Pipeline Scan

3
Comments
2 min read
AWS Security Hub Guidebook - Unwinding security concerns

AWS Security Hub Guidebook - Unwinding security concerns

4
Comments
5 min read
Secretlint 6: masking API tokens in .bash_history and .zsh_history

Secretlint 6: masking API tokens in .bash_history and .zsh_history

1
Comments
4 min read
Cybersecurity 101 - Part 1

Cybersecurity 101 - Part 1

3
Comments
4 min read
OpenBSD フルディスク暗号化 (on VirtualBox)

OpenBSD フルディスク暗号化 (on VirtualBox)

1
Comments
2 min read
how to install assetfinder tool on any linunx distro 🐧

how to install assetfinder tool on any linunx distro 🐧

4
Comments
1 min read
Passwords in SQL-Server C#

Passwords in SQL-Server C#

6
Comments
3 min read
Top 5 Featured DEV Tag(#security) Posts from the year 2022

Top 5 Featured DEV Tag(#security) Posts from the year 2022

8
Comments 2
2 min read
Introducing Secweb security headers for fastapi and starlette framework

Introducing Secweb security headers for fastapi and starlette framework

5
Comments
2 min read
BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

6
Comments
3 min read
Software Supply Chain Security Leadership Series: Measuring SBOM Quality

Software Supply Chain Security Leadership Series: Measuring SBOM Quality

3
Comments
1 min read
Blockchain: from A to Z in 10 minutes for future Smart Contract Engineers

Blockchain: from A to Z in 10 minutes for future Smart Contract Engineers

9
Comments 4
13 min read
What is a cookie, and what are they used for?

What is a cookie, and what are they used for?

55
Comments 19
3 min read
Complete Guide on OAuth 2.0 Reference tokens in Asp.Net Core 7 Using Openiddict

Complete Guide on OAuth 2.0 Reference tokens in Asp.Net Core 7 Using Openiddict

12
Comments 1
7 min read
Running graphic apps in Docker: AWS WorkSpaces

Running graphic apps in Docker: AWS WorkSpaces

7
Comments
3 min read
Weird Phishing attempt on GitHub

Weird Phishing attempt on GitHub

2
Comments 2
2 min read
Code Smell 189 - Not Sanitized Input

Code Smell 189 - Not Sanitized Input

8
Comments 2
2 min read
🛡️ Virtual Protection 101🔒: Managing Users, Groups, and Firewalls🔥 in Ubuntu 💻

🛡️ Virtual Protection 101🔒: Managing Users, Groups, and Firewalls🔥 in Ubuntu 💻

3
Comments
4 min read
Auth0: implementing a device flow in a Console Application with .NET 7 - Part 2

Auth0: implementing a device flow in a Console Application with .NET 7 - Part 2

2
Comments
2 min read
Auth0: implementing a device flow in a Console Application with .NET 7

Auth0: implementing a device flow in a Console Application with .NET 7

3
Comments
3 min read
What is JWT(JSON WEB TOKEN) & how it works

What is JWT(JSON WEB TOKEN) & how it works

3
Comments
3 min read
Monitor Your Cloud Environment with AWS Trusted Advisor ☁️

Monitor Your Cloud Environment with AWS Trusted Advisor ☁️

12
Comments
4 min read
What is Identity and Access Management(IAM) Service ?

What is Identity and Access Management(IAM) Service ?

1
Comments
1 min read
Level up your secrets management in Kubernetes using AWS Secret Manager and Helm

Level up your secrets management in Kubernetes using AWS Secret Manager and Helm

5
Comments
3 min read
How to implement CAPTCHAs or reCAPTCHAs?

How to implement CAPTCHAs or reCAPTCHAs?

37
Comments 4
5 min read
RBAC vs ReBAC: When to use them

RBAC vs ReBAC: When to use them

41
Comments 4
5 min read
SSL Certificates - an easy to understand guide

SSL Certificates - an easy to understand guide

7
Comments
5 min read
Semgrep Writing Rule Tutorial (DOM-Based XSS)

Semgrep Writing Rule Tutorial (DOM-Based XSS)

1
Comments
7 min read
Developers Guide to DevSecOps

Developers Guide to DevSecOps

26
Comments
8 min read
Security state of the Azure DevOps Marketplace

Security state of the Azure DevOps Marketplace

1
Comments
27 min read
Biz s++ o'rganishni boshladik.

Biz s++ o'rganishni boshladik.

6
Comments 1
7 min read
Utilizando Metasploit, resumo básico do funcionamento.

Utilizando Metasploit, resumo básico do funcionamento.

9
Comments
4 min read
How to test the performance of your GraphQL applications?

How to test the performance of your GraphQL applications?

7
Comments 1
3 min read
The Importance of Internal Cloud Security Standards

The Importance of Internal Cloud Security Standards

7
Comments 2
4 min read
Como criar uma Service Connection

Como criar uma Service Connection

2
Comments
1 min read
Como adicionar SAST e SCA em uma validação de PR?

Como adicionar SAST e SCA em uma validação de PR?

4
Comments
5 min read
Configurando o arquivo de credenciais

Configurando o arquivo de credenciais

9
Comments
2 min read
Enrich Splunk events with Steampipe

Enrich Splunk events with Steampipe

3
Comments
6 min read
Why is char[] preferred over String for passwords in Java ?

Why is char[] preferred over String for passwords in Java ?

5
Comments
1 min read
Unleashing the Power of Kubernetes 1.26: Exploring the New ValidatingAdmissionPolicy Feature with CEL

Unleashing the Power of Kubernetes 1.26: Exploring the New ValidatingAdmissionPolicy Feature with CEL

3
Comments
7 min read
Top Cloud Secret Management Tools and How To Choose the Right One

Top Cloud Secret Management Tools and How To Choose the Right One

6
Comments
18 min read
loading...