DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Protect Your SignalR Service Based Real-time Application with Application Gateway

Protect Your SignalR Service Based Real-time Application with Application Gateway

18
Comments 10
6 min read
Openssl by Example

Openssl by Example

5
Comments
1 min read
Cross-site scripting (XSS) attack - part 3

Cross-site scripting (XSS) attack - part 3

8
Comments
4 min read
Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

14
Comments
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
Authenticating Event Hubs publishers with SAS Token

Authenticating Event Hubs publishers with SAS Token

6
Comments
4 min read
The 10 most in-demand roles in the Information Security domain

The 10 most in-demand roles in the Information Security domain

6
Comments
2 min read
Delete all users in an Azure AD Tenant programmatically

Delete all users in an Azure AD Tenant programmatically

8
Comments
4 min read
Delete an Azure AD B2C tenant programmatically

Delete an Azure AD B2C tenant programmatically

8
Comments
2 min read
AWS: Route53 Private Hosted Zones — hiding domains from the Internet

AWS: Route53 Private Hosted Zones — hiding domains from the Internet

2
Comments
4 min read
Stealthy Code Injection in a Running .NET Process

Stealthy Code Injection in a Running .NET Process

11
Comments
8 min read
Securing Azure SignalR +Azure App Service - Part 4

Securing Azure SignalR +Azure App Service - Part 4

2
Comments
2 min read
Pentesting detection on EDR

Pentesting detection on EDR

19
Comments
2 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

3
Comments
7 min read
Cross-site scripting (XSS) attack - Part 2

Cross-site scripting (XSS) attack - Part 2

27
Comments
4 min read
Secure your GitHub Personal Access Tokens with an Expiration Date

Secure your GitHub Personal Access Tokens with an Expiration Date

8
Comments
2 min read
Landing Zones, Organizations, OUs and Multi-Account Environments

Landing Zones, Organizations, OUs and Multi-Account Environments

13
Comments 1
5 min read
Secure Open API (Swagger) calls with Azure Active Directory

Secure Open API (Swagger) calls with Azure Active Directory

8
Comments 11
3 min read
Updates for SQL Injection in Rails 6.1

Updates for SQL Injection in Rails 6.1

11
Comments
3 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Installing Krypt.co on NVIDIA Jetson Nano

Installing Krypt.co on NVIDIA Jetson Nano

3
Comments
4 min read
Verifying JWTs with JWKS in Ruby

Verifying JWTs with JWKS in Ruby

3
Comments
5 min read
How to set GitHub Actions's `permissions`?

How to set GitHub Actions's `permissions`?

10
Comments 1
2 min read
Cross-site scripting (XSS) attack - Part 1

Cross-site scripting (XSS) attack - Part 1

79
Comments
4 min read
More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

2
Comments
4 min read
On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

20
Comments 33
8 min read
Passman - a password manager for the command line

Passman - a password manager for the command line

2
Comments
1 min read
How to add a login form to any website, without a single line of code

How to add a login form to any website, without a single line of code

5
Comments
6 min read
AWS: Web Application Firewall overview, configuration, and its monitoring

AWS: Web Application Firewall overview, configuration, and its monitoring

8
Comments
16 min read
Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

6
Comments
4 min read
Managing remote servers with SSH and SFTP connections: a step-by-step guide

Managing remote servers with SSH and SFTP connections: a step-by-step guide

14
Comments
12 min read
Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

5
Comments
1 min read
IvyFinal CTF (Crypto 3) - Silly 400 - points

IvyFinal CTF (Crypto 3) - Silly 400 - points

5
Comments
2 min read
Top Information Gathering Methods Explained

Top Information Gathering Methods Explained

2
Comments
4 min read
Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

17
Comments
6 min read
Security news weekly round-up - 16th July 2021

Security news weekly round-up - 16th July 2021

2
Comments
3 min read
Istio Authentication & Authorization

Istio Authentication & Authorization

3
Comments 1
6 min read
The Limits of Automation w/ Judy Johnson

The Limits of Automation w/ Judy Johnson

8
Comments 1
1 min read
Application Layer DDoS Attacks

Application Layer DDoS Attacks

6
Comments
2 min read
Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

4
Comments
2 min read
How to verify your commits on GitHub

How to verify your commits on GitHub

71
Comments 4
4 min read
Firebase Auth | Understanding The Auth

Firebase Auth | Understanding The Auth

41
Comments 1
2 min read
Securing React Native Application

Securing React Native Application

74
Comments 2
9 min read
How to securely send/receive key params in an .NET Core WebAPI and Javascript Application

How to securely send/receive key params in an .NET Core WebAPI and Javascript Application

5
Comments
3 min read
10 Steps To Secure Your Cloud

10 Steps To Secure Your Cloud

80
Comments 3
6 min read
IvyFinal CTF (Crypto 1) - Warmup 50 points

IvyFinal CTF (Crypto 1) - Warmup 50 points

2
Comments
1 min read
So what *is* privacy? (In the context of privacy tech)

So what *is* privacy? (In the context of privacy tech)

5
Comments
6 min read
Digital certificates and what they do

Digital certificates and what they do

7
Comments
1 min read
secretlint can mask the secrets

secretlint can mask the secrets

5
Comments
1 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

107
Comments 7
4 min read
How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

2
Comments
8 min read
Encryption without passwords

Encryption without passwords

13
Comments
6 min read
Keycloak for Local Development

Keycloak for Local Development

6
Comments
5 min read
Understanding HTTPS

Understanding HTTPS

3
Comments
3 min read
Finding Time For Security When Scaling w/ Liran Tal

Finding Time For Security When Scaling w/ Liran Tal

10
Comments
1 min read
So what exactly are AWS Nitro Enclaves?

So what exactly are AWS Nitro Enclaves?

9
Comments
7 min read
Top 10 React Tricks Every Developer Should Use

Top 10 React Tricks Every Developer Should Use

221
Comments 1
5 min read
Anonymize your data using Amazon S3 Object Lambda

Anonymize your data using Amazon S3 Object Lambda

6
Comments
5 min read
Wault: The future of password managers

Wault: The future of password managers

13
Comments 8
2 min read
loading...