DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Must know — Container Security Constructs: Namespace, SecComp, Control Groups, SELinux

Must know — Container Security Constructs: Namespace, SecComp, Control Groups, SELinux

11
Comments
2 min read
Securing .NET 6 Minimal API with Auth0

Securing .NET 6 Minimal API with Auth0

15
Comments 2
4 min read
Sign your code

Sign your code

12
Comments
3 min read
Learnings After 400 API Security Testing

Learnings After 400 API Security Testing

10
Comments
2 min read
Re-Entrancy

Re-Entrancy

9
Comments
2 min read
How much is technical debt costing you? Try the tech debt calculator

How much is technical debt costing you? Try the tech debt calculator

4
Comments 1
6 min read
Preventing User Enumeration Attack in Laravel Apps

Preventing User Enumeration Attack in Laravel Apps

9
Comments
5 min read
GitHub Actions Security Cheat Sheet

GitHub Actions Security Cheat Sheet

21
Comments
15 min read
What is DAST, and Why Should Developers Use It?

What is DAST, and Why Should Developers Use It?

10
Comments 1
2 min read
Serverless querying and evaluating of Logs using Athena

Serverless querying and evaluating of Logs using Athena

11
Comments
5 min read
Configure AWS Site to Site VPN with on-premise Firewall using pfSense

Configure AWS Site to Site VPN with on-premise Firewall using pfSense

19
Comments
4 min read
NorthSec 2022: Tako SSO

NorthSec 2022: Tako SSO

10
Comments
2 min read
NorthSec 2022: Rego Prototype Review

NorthSec 2022: Rego Prototype Review

10
Comments
6 min read
Simple PKI with CA issuer

Simple PKI with CA issuer

9
Comments
6 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

4
Comments
4 min read
How to provide restricted & secure access to a third party, to your AWS accounts, using Attribute Based Access Control (ABAC)

How to provide restricted & secure access to a third party, to your AWS accounts, using Attribute Based Access Control (ABAC)

11
Comments
8 min read
Serverless Application is not as secure as you might think!

Serverless Application is not as secure as you might think!

8
Comments
5 min read
Ethernaut系列-说明

Ethernaut系列-说明

7
Comments
1 min read
How to restrict country to access your website with Netlify?

How to restrict country to access your website with Netlify?

6
Comments
1 min read
Controlling access in service-to-service communications with Cognito - Part 2

Controlling access in service-to-service communications with Cognito - Part 2

13
Comments
5 min read
GitHub’s inconsistent access control

GitHub’s inconsistent access control

5
Comments
4 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

4
Comments
1 min read
How to connect SuperTokens to a MySQL or to a PostgreSQL database

How to connect SuperTokens to a MySQL or to a PostgreSQL database

4
Comments
11 min read
OpenAPI Specification: The Complete Guide

OpenAPI Specification: The Complete Guide

29
Comments 1
5 min read
Desarrolla de forma segura, aplicando DevSecOps

Desarrolla de forma segura, aplicando DevSecOps

12
Comments
5 min read
RepoMetaScore: evaluate supply chain risks of open-source projects

RepoMetaScore: evaluate supply chain risks of open-source projects

8
Comments 1
2 min read
How-to Get Free API Security Testing Report

How-to Get Free API Security Testing Report

6
Comments
1 min read
Simpler way to secure data with Ruby and Basis Theory

Simpler way to secure data with Ruby and Basis Theory

4
Comments
3 min read
Calling the brute(force) squad

Calling the brute(force) squad

5
Comments
6 min read
Adding headers to the response in an angular application.

Adding headers to the response in an angular application.

4
Comments
1 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

6
Comments
6 min read
How did I discover a security vulnerability in a system of my university

How did I discover a security vulnerability in a system of my university

3
Comments
6 min read
#1 iOS Security Tips: UIPasteboard | iOS Development

#1 iOS Security Tips: UIPasteboard | iOS Development

6
Comments 1
1 min read
Security doesn’t have to be a blocker

Security doesn’t have to be a blocker

3
Comments
3 min read
Free Trial! Beosin Vaa, the industry-leading automatic smart contract security analysis platform

Free Trial! Beosin Vaa, the industry-leading automatic smart contract security analysis platform

3
Comments
1 min read
Running a ransomware attack in a Node.js module

Running a ransomware attack in a Node.js module

444
Comments 15
7 min read
Shifting left with vulnerability management

Shifting left with vulnerability management

4
Comments
3 min read
Zero Trust Explained

Zero Trust Explained

5
Comments
8 min read
A Threat Overview of Contact Tracing technology

A Threat Overview of Contact Tracing technology

4
Comments
12 min read
Biometric Access Control Systems: Everything You Need to Know

Biometric Access Control Systems: Everything You Need to Know

6
Comments
5 min read
Accessing external Secrets in Gitlab CI

Accessing external Secrets in Gitlab CI

18
Comments
2 min read
WAF -Web application firewall

WAF -Web application firewall

7
Comments
3 min read
Denial of Service

Denial of Service

10
Comments
1 min read
A Beginner's Guide to Application Security

A Beginner's Guide to Application Security

5
Comments 3
6 min read
How to deploy SuperTokens with React and NodeJS on Vercel

How to deploy SuperTokens with React and NodeJS on Vercel

10
Comments
3 min read
Controlling access in service-to-service communications with Cognito - Part 1

Controlling access in service-to-service communications with Cognito - Part 1

21
Comments
6 min read
Shortcut for AWS CDK credentials: insanely simple setup for SSO, SAML, and named profiles

Shortcut for AWS CDK credentials: insanely simple setup for SSO, SAML, and named profiles

18
Comments
6 min read
Logging SSH and Session activity using AWS Systems Manager

Logging SSH and Session activity using AWS Systems Manager

16
Comments
5 min read
Encrypting Folders on MacOS

Encrypting Folders on MacOS

3
Comments
1 min read
Secure TCP tunnel from anywhere with curl and nc for single connection

Secure TCP tunnel from anywhere with curl and nc for single connection

16
Comments
14 min read
Passwordless face login with Entry in the React app

Passwordless face login with Entry in the React app

7
Comments
3 min read
Getting started developing Falco

Getting started developing Falco

5
Comments
8 min read
Support Tips #1 - Digital Security Basics

Support Tips #1 - Digital Security Basics

4
Comments
9 min read
Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

4
Comments 1
1 min read
Distroless Alpine

Distroless Alpine

12
Comments 1
3 min read
Running Basic Security Tests Against Twitter API

Running Basic Security Tests Against Twitter API

4
Comments
1 min read
Understanding the Shared Responsibility Model in AWS

Understanding the Shared Responsibility Model in AWS

8
Comments
4 min read
What is AWS Detective?

What is AWS Detective?

5
Comments
2 min read
🎞️ This is how we maintain & release Secured Software on Github 🤖

🎞️ This is how we maintain & release Secured Software on Github 🤖

4
Comments
2 min read
Build a discoverable change password form

Build a discoverable change password form

12
Comments
1 min read
loading...