DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Can you run an AWS command from Slack, without any AWS credentials? Let’s find out!

Can you run an AWS command from Slack, without any AWS credentials? Let’s find out!

5
Comments 1
4 min read
How to delete pods with kubectl in Kubernetes

How to delete pods with kubectl in Kubernetes

10
Comments
3 min read
Implementing an AWS Client VPN Solution

Implementing an AWS Client VPN Solution

Comments
2 min read
Using the Link block

Using the Link block

Comments
5 min read
Secure Your Coding: Create an SSH Key on Mac or Windows

Secure Your Coding: Create an SSH Key on Mac or Windows

1
Comments
4 min read
How to Ensure Your Full Stack JavaScript Apps Meet Security Standards

How to Ensure Your Full Stack JavaScript Apps Meet Security Standards

1
Comments
7 min read
Opaque token vs JWT

Opaque token vs JWT

27
Comments
7 min read
AWS IAM User Access Keys are a force to be reckoned with & This is how it is done, on exposure !!

AWS IAM User Access Keys are a force to be reckoned with & This is how it is done, on exposure !!

1
Comments
3 min read
DKIM, DMARC and SPF: The protective shield for your email communication 🛡️

DKIM, DMARC and SPF: The protective shield for your email communication 🛡️

1
Comments
5 min read
Good Security Boosts Your Flow

Good Security Boosts Your Flow

Comments
7 min read
Pulsar preventing vulnerabilities #1 — polkit (CVE-2021–4034)

Pulsar preventing vulnerabilities #1 — polkit (CVE-2021–4034)

Comments
4 min read
Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Comments
7 min read
Keys in SQL | Primary Key | Foreign Key| Candidate Key|Composite Key |Alternate Key|Super Key|Surrogate Key| Unique Key

Keys in SQL | Primary Key | Foreign Key| Candidate Key|Composite Key |Alternate Key|Super Key|Surrogate Key| Unique Key

Comments
3 min read
Issue 61 of AWS Cloud Security Weekly

Issue 61 of AWS Cloud Security Weekly

1
Comments
2 min read
Issue 64 of AWS Cloud Security Weekly

Issue 64 of AWS Cloud Security Weekly

3
Comments
3 min read
Securing and enhancing LLM prompts & outputs: A guide using Amazon Bedrock Guardrails and open-source solutions

Securing and enhancing LLM prompts & outputs: A guide using Amazon Bedrock Guardrails and open-source solutions

13
Comments 1
14 min read
Integrating Firebase Authentication into NestJS with nestjs-firebase-auth

Integrating Firebase Authentication into NestJS with nestjs-firebase-auth

1
Comments
4 min read
How to Use Nmap & Zenmap for Network Security Scanning

How to Use Nmap & Zenmap for Network Security Scanning

1
Comments
4 min read
Secure Your Website: Best Practices for AWS Deployment

Secure Your Website: Best Practices for AWS Deployment

1
Comments
4 min read
Insights on Securing Your Kubernetes Cluster with Falco 🚀🔒

Insights on Securing Your Kubernetes Cluster with Falco 🚀🔒

Comments
5 min read
Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Comments
15 min read
Secure Your Data with Entity Framework Core Encryption

Secure Your Data with Entity Framework Core Encryption

2
Comments 1
5 min read
Red Teaming for Responsible AI

Red Teaming for Responsible AI

4
Comments
4 min read
Proxmox Network Storage: Firewall Rules

Proxmox Network Storage: Firewall Rules

3
Comments
3 min read
Pentesting AWS Cognito: User Authentication Risks

Pentesting AWS Cognito: User Authentication Risks

Comments
12 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Protecting your Fintech App Customers further with Panic Password

Protecting your Fintech App Customers further with Panic Password

3
Comments
3 min read
How to disable root ssh login in Linux

How to disable root ssh login in Linux

Comments
1 min read
Handling JWT Authentications Securely: Pitfalls and Best Practices

Handling JWT Authentications Securely: Pitfalls and Best Practices

6
Comments
3 min read
The backbone of the internet: understanding protocol

The backbone of the internet: understanding protocol

Comments
4 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

11
Comments
3 min read
AWS Security Group Rules

AWS Security Group Rules

Comments
2 min read
LINUX Systems Under Attack via Printing System (CUPS)

LINUX Systems Under Attack via Printing System (CUPS)

4
Comments
5 min read
Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Comments
3 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

4
Comments
2 min read
Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
This Month in Minder: September 2024

This Month in Minder: September 2024

3
Comments
1 min read
Easy way to geo-fence your cloud VPS with nftables

Easy way to geo-fence your cloud VPS with nftables

Comments 1
5 min read
AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

1
Comments 1
1 min read
Why should you upgrade your PostgreSQL today?

Why should you upgrade your PostgreSQL today?

1
Comments 1
3 min read
Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

1
Comments 1
4 min read
3G Cell Service Has a HUGE Security Flaw.

3G Cell Service Has a HUGE Security Flaw.

21
Comments 9
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

9
Comments
1 min read
Building a Password Manager in Go: Part 2

Building a Password Manager in Go: Part 2

10
Comments 1
3 min read
Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

1
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
From legacy to cloud serverless - Part 4

From legacy to cloud serverless - Part 4

Comments
7 min read
Enhance DigitalOcean with AWS-Level SSM and SSO Features

Enhance DigitalOcean with AWS-Level SSM and SSO Features

Comments
4 min read
Network Automization using AI.

Network Automization using AI.

Comments
6 min read
HIPAA Compliance Checklist For Healthcare Startups

HIPAA Compliance Checklist For Healthcare Startups

Comments
7 min read
How to publish custom cdk-nag rules and rule packs with Projen

How to publish custom cdk-nag rules and rule packs with Projen

5
Comments
6 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

1
Comments
3 min read
Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

4
Comments
6 min read
Proxmox and NAS: Implementing VLANs for Network Isolation

Proxmox and NAS: Implementing VLANs for Network Isolation

Comments
4 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

1
Comments
3 min read
loading...