DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Awesome Posts from last week tagged(#security)

Awesome Posts from last week tagged(#security)

4
Comments 2
2 min read
5 Pro Tips to secure WordPress from hacking

5 Pro Tips to secure WordPress from hacking

2
Comments 1
6 min read
Security analysis of a repository pattern and asking ChatGPT about it.

Security analysis of a repository pattern and asking ChatGPT about it.

2
Comments
3 min read
'; SQL_Injection ( ) ;--

'; SQL_Injection ( ) ;--

6
Comments 2
7 min read
⌛ Manage EoLs like a boss with endoflife.date 🛑

⌛ Manage EoLs like a boss with endoflife.date 🛑

16
Comments 10
3 min read
Desenho de implementação de pipeline

Desenho de implementação de pipeline

3
Comments
2 min read
AWS multi-account strategy explained

AWS multi-account strategy explained

5
Comments
7 min read
How to Securely Store Passwords with GPG & PASS

How to Securely Store Passwords with GPG & PASS

6
Comments
4 min read
Exploring the Spring Security authorization bypass (CVE-2022-31692)

Exploring the Spring Security authorization bypass (CVE-2022-31692)

Comments
5 min read
What is Policy as Code?

What is Policy as Code?

Comments
3 min read
Criando um bloqueador de IP com python

Criando um bloqueador de IP com python

1
Comments
1 min read
All You Should Know About Netwalker Ransomware

All You Should Know About Netwalker Ransomware

2
Comments
15 min read
pedumper: A new tool for dumping PE files

pedumper: A new tool for dumping PE files

Comments
1 min read
Métodos de segurança em API

Métodos de segurança em API

5
Comments
2 min read
OpenBSD Full Disk Encryption (on VirtualBox)

OpenBSD Full Disk Encryption (on VirtualBox)

1
Comments
4 min read
All You Need to Know About FIDO2 & Passwordless Authentication

All You Need to Know About FIDO2 & Passwordless Authentication

14
Comments 4
5 min read
Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471)

Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471)

4
Comments
5 min read
How JWTs Could Be Dangerous and Its Alternatives

How JWTs Could Be Dangerous and Its Alternatives

236
Comments 25
5 min read
Avoid configuration drift on your terraform state when using aws_security_group

Avoid configuration drift on your terraform state when using aws_security_group

4
Comments 1
4 min read
WordPress (plugins) compatibility check to prevent fatal errors

WordPress (plugins) compatibility check to prevent fatal errors

13
Comments 4
9 min read
How to Scrape Tweets from Twitter with Python using Tweeds

How to Scrape Tweets from Twitter with Python using Tweeds

7
Comments 3
2 min read
A Guide To Privacy Part 1

A Guide To Privacy Part 1

3
Comments 2
3 min read
A Guide To Digital Privacy Part 2

A Guide To Digital Privacy Part 2

3
Comments 1
5 min read
How to steal a website and how to prevent it

How to steal a website and how to prevent it

9
Comments 2
4 min read
Automatic SSO in Kubernetes workloads using a sidecar container

Automatic SSO in Kubernetes workloads using a sidecar container

20
Comments 1
3 min read
Getting Started In Cyber security - A 2023 Guide

Getting Started In Cyber security - A 2023 Guide

4
Comments
4 min read
Securing your NextJS Web Application with AWS Amplify and Cognito

Securing your NextJS Web Application with AWS Amplify and Cognito

6
Comments
2 min read
A Deep Dive into Introduction to Computer Networking

A Deep Dive into Introduction to Computer Networking

4
Comments
9 min read
Invalidating JSON Web Tokens (JWT) the Right Way

Invalidating JSON Web Tokens (JWT) the Right Way

2
Comments
4 min read
Kubernetes: ServiceAccount with AWS IAM Role for Kubernetes Pod

Kubernetes: ServiceAccount with AWS IAM Role for Kubernetes Pod

2
Comments
5 min read
AWS re:Invent 2022: Security Session Notes đź“ť

AWS re:Invent 2022: Security Session Notes đź“ť

5
Comments
5 min read
Using secrets stored in AWS Secrets Manager as environment variables for ECS container definitions. With Terraform.

Using secrets stored in AWS Secrets Manager as environment variables for ECS container definitions. With Terraform.

12
Comments
4 min read
What is Subnet on AWS VPC?

What is Subnet on AWS VPC?

11
Comments
2 min read
Better two factor authentication experiences with WebOTP

Better two factor authentication experiences with WebOTP

52
Comments 14
5 min read
How to Invalidate JWT Tokens Without Collecting Tokens

How to Invalidate JWT Tokens Without Collecting Tokens

101
Comments 29
3 min read
Integrating Keycloak Identity Management in the Frontend and Backend

Integrating Keycloak Identity Management in the Frontend and Backend

4
Comments
4 min read
How to use Laravel Session

How to use Laravel Session

13
Comments
3 min read
How to use Azure pipelines for automatic certificate renewal

How to use Azure pipelines for automatic certificate renewal

2
Comments
6 min read
Managing and sharing secrets in a Git repository with Keybase

Managing and sharing secrets in a Git repository with Keybase

2
Comments
4 min read
Secure Smart Contract Tools—An End-to-End Developer’s Guide

Secure Smart Contract Tools—An End-to-End Developer’s Guide

4
Comments
7 min read
Verifying data integrity with KMS asymmetric keys

Verifying data integrity with KMS asymmetric keys

6
Comments
8 min read
Microsoft Defender for DevOps (Preview)

Microsoft Defender for DevOps (Preview)

2
Comments
6 min read
9 Things to Consider When Choosing an SCA Tool

9 Things to Consider When Choosing an SCA Tool

3
Comments 1
7 min read
Roles and Permissions in Plain English

Roles and Permissions in Plain English

5
Comments
5 min read
Network Access Control Lists vs Security Groups

Network Access Control Lists vs Security Groups

4
Comments
6 min read
Multi-tenant Security Implementation

Multi-tenant Security Implementation

5
Comments 1
6 min read
AWS Inspector for AWS Lambda

AWS Inspector for AWS Lambda

7
Comments
4 min read
Ruby on Rails Security: 8 Best Practices

Ruby on Rails Security: 8 Best Practices

Comments
6 min read
Web Security 101 - Part 1: Secrets

Web Security 101 - Part 1: Secrets

165
Comments 8
6 min read
Using ZTNA to Secure Your APIs

Using ZTNA to Secure Your APIs

3
Comments 1
4 min read
Bicep: Create IoT Hub and Storage routing with private endpoint

Bicep: Create IoT Hub and Storage routing with private endpoint

3
Comments
6 min read
Fixing the firewall with UFW for Amazon EC2 (when you accidentally blocked port 22)

Fixing the firewall with UFW for Amazon EC2 (when you accidentally blocked port 22)

4
Comments
3 min read
Scan Your AWS Lambda Functions with Amazon Inspector

Scan Your AWS Lambda Functions with Amazon Inspector

10
Comments
3 min read
Improving your CI/CD Pipeline: Helm Charts Security Scanning with Trivy and GitHub Actions

Improving your CI/CD Pipeline: Helm Charts Security Scanning with Trivy and GitHub Actions

3
Comments
5 min read
Adding Django Admin Panel MFA to an Existing Project

Adding Django Admin Panel MFA to an Existing Project

3
Comments
6 min read
How attackers use exposed Prometheus server to exploit Kubernetes clusters

How attackers use exposed Prometheus server to exploit Kubernetes clusters

6
Comments
12 min read
Open-source tool enables fuzz testing in JUnit

Open-source tool enables fuzz testing in JUnit

3
Comments
6 min read
What is a VPN?

What is a VPN?

2
Comments
1 min read
Stop Comparing JWT vs Cookies

Stop Comparing JWT vs Cookies

10
Comments
9 min read
Web Security 101 - Part 2: User Input

Web Security 101 - Part 2: User Input

32
Comments 1
7 min read
loading...