DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
Policy Sentry - IAM Least Privilege Policy Generator

Policy Sentry - IAM Least Privilege Policy Generator

10
Comments
8 min read
Building a Security-First Culture As A Developer or Team

Building a Security-First Culture As A Developer or Team

6
Comments
2 min read
Manually Updating .env Files Isn't DevOps

Manually Updating .env Files Isn't DevOps

8
Comments
7 min read
Running Tomcat on Privileged Ports

Running Tomcat on Privileged Ports

8
Comments
3 min read
A technical tale of NodeSecure - Chapter 2

A technical tale of NodeSecure - Chapter 2

7
Comments
6 min read
Define Amazon Cognito as authoriser for lambda function in serverless using shared API Gateway 🚀

Define Amazon Cognito as authoriser for lambda function in serverless using shared API Gateway 🚀

7
Comments
3 min read
Delegate Call - Context is Preserved

Delegate Call - Context is Preserved

6
Comments
1 min read
How to ask for payment when finding security issues in a big website

How to ask for payment when finding security issues in a big website

5
Comments 6
1 min read
PyScript XSS

PyScript XSS

7
Comments
1 min read
Understanding JWT

Understanding JWT

51
Comments 6
4 min read
Delegate Call - Order of Variables

Delegate Call - Order of Variables

6
Comments
2 min read
Hack The Box Writeup: Cronos

Hack The Box Writeup: Cronos

7
Comments
10 min read
Ruby cryptographic gems

Ruby cryptographic gems

8
Comments
3 min read
Cloudsplaining - AWS IAM Security Assessment Tool

Cloudsplaining - AWS IAM Security Assessment Tool

13
Comments
9 min read
Code Smell 138 - Packages Dependency

Code Smell 138 - Packages Dependency

7
Comments
2 min read
Understanding CSRF Attacks

Understanding CSRF Attacks

197
Comments 5
11 min read
Why your API should explicitly take resource owner id as a parameter instead of inferring from authentication.

Why your API should explicitly take resource owner id as a parameter instead of inferring from authentication.

8
Comments
3 min read
GitHub Personal Access Tokens (PAT)

GitHub Personal Access Tokens (PAT)

3
Comments 1
3 min read
Web Crawling VS Web Scraping: What Is the Difference?

Web Crawling VS Web Scraping: What Is the Difference?

7
Comments 3
4 min read
What is DevSecOps? Shift security left in your DevOps lifecycle

What is DevSecOps? Shift security left in your DevOps lifecycle

3
Comments
4 min read
What is Identity : Auth0

What is Identity : Auth0

4
Comments
1 min read
Linux Security Modules

Linux Security Modules

2
Comments
6 min read
Is web scraping legal?

Is web scraping legal?

7
Comments 2
17 min read
Penetration Testing Stages and Methodologies

Penetration Testing Stages and Methodologies

2
Comments 1
2 min read
Replace a JPA entity with a DTO

Replace a JPA entity with a DTO

10
Comments 2
4 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
LGPD e falsear dados sensíveis no banco de dados de dev e staging - parte 1

LGPD e falsear dados sensíveis no banco de dados de dev e staging - parte 1

5
Comments
5 min read
OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Securing our internal tools

Securing our internal tools

10
Comments
2 min read
What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
AWS Security Stories #02: AWS Trusted Advisor

AWS Security Stories #02: AWS Trusted Advisor

Comments
1 min read
Enforcing encryption standards on S3-objects

Enforcing encryption standards on S3-objects

10
Comments
6 min read
Security in Laravel: How to Protect Your App Part 4

Security in Laravel: How to Protect Your App Part 4

12
Comments 1
1 min read
Carbon - Python Renamer

Carbon - Python Renamer

5
Comments 1
1 min read
Types of Steganography methods that are used for hiding confidential data.

Types of Steganography methods that are used for hiding confidential data.

8
Comments
4 min read
Prevent External Contracts

Prevent External Contracts

6
Comments
2 min read
AWS Security Stories #01: Virtual Patching

AWS Security Stories #01: Virtual Patching

3
Comments
3 min read
Scaled Virus Scanner using AWS Fargate, ClamAV, S3, and SQS with Terraform

Scaled Virus Scanner using AWS Fargate, ClamAV, S3, and SQS with Terraform

10
Comments 7
8 min read
Where can I find regex to prevent code injection?

Where can I find regex to prevent code injection?

2
Comments 3
1 min read
Security in Laravel: How to Protect Your App Part 3

Security in Laravel: How to Protect Your App Part 3

10
Comments 1
2 min read
Stop putting AWS credentials in the credentials file

Stop putting AWS credentials in the credentials file

19
Comments
6 min read
Update Firefox products now to fix critical vulnerabilities

Update Firefox products now to fix critical vulnerabilities

6
Comments
1 min read
HackTheBox Pandora Walkthrough

HackTheBox Pandora Walkthrough

5
Comments
17 min read
Careful while using tx.origin

Careful while using tx.origin

7
Comments
2 min read
Security in Laravel: How to Protect Your App Part 2

Security in Laravel: How to Protect Your App Part 2

11
Comments 1
1 min read
Bug Bounty vs. Security Scanner

Bug Bounty vs. Security Scanner

7
Comments
2 min read
What is Software Supply Chain Security?

What is Software Supply Chain Security?

4
Comments
3 min read
Removing sensitive information from HTTP headers in Lambda functions

Removing sensitive information from HTTP headers in Lambda functions

22
Comments
3 min read
What is the importance of API security for businesses today?

What is the importance of API security for businesses today?

16
Comments
2 min read
Security in Laravel: How to Protect Your App Part 1

Security in Laravel: How to Protect Your App Part 1

16
Comments 2
2 min read
How to Handle GraphQL Errors for a Secure API

How to Handle GraphQL Errors for a Secure API

14
Comments
4 min read
Sharing my experience after scanning 400 APIs

Sharing my experience after scanning 400 APIs

8
Comments
2 min read
Making Security Fun for Developers

Making Security Fun for Developers

6
Comments
2 min read
Force Send ETH - 2

Force Send ETH - 2

10
Comments
2 min read
Arithmetic overflow/underflow

Arithmetic overflow/underflow

10
Comments
2 min read
Force Send ETH - 1

Force Send ETH - 1

9
Comments
1 min read
Withdraw and modify restriction in password django application

Withdraw and modify restriction in password django application

10
Comments 1
1 min read
Trends at Blackhat Asia 2022

Trends at Blackhat Asia 2022

8
Comments
4 min read
How I passed the AWS Security Speciality exam with mostly free content 🥇

How I passed the AWS Security Speciality exam with mostly free content 🥇

32
Comments 2
10 min read
loading...