DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
10 Secure Coding Best Practices to Follow in Every Project

10 Secure Coding Best Practices to Follow in Every Project

15
Comments
3 min read
Why is Data Security a Developer Service Problem?

Why is Data Security a Developer Service Problem?

6
Comments
5 min read
Browser Fingerprinting: What Is It and How Does It Work?

Browser Fingerprinting: What Is It and How Does It Work?

7
Comments
10 min read
AWS IAM Security Best Practices

AWS IAM Security Best Practices

8
Comments
18 min read
Using Zero Trust Networking in Cloud Migrations

Using Zero Trust Networking in Cloud Migrations

12
Comments
3 min read
Use htpasswd to secure your node-RED Container

Use htpasswd to secure your node-RED Container

9
Comments
4 min read
Using 1Password CLI for secrets locally

Using 1Password CLI for secrets locally

18
Comments
2 min read
Understanding CORS Misconfiguration

Understanding CORS Misconfiguration

18
Comments
3 min read
Implementing MSAL Authentication in a React App

Implementing MSAL Authentication in a React App

7
Comments
7 min read
Machine Learning In Cyber Security

Machine Learning In Cyber Security

4
Comments
4 min read
API Security with OIDC by using Apache APISIX and Microsoft Azure AD

API Security with OIDC by using Apache APISIX and Microsoft Azure AD

39
Comments
7 min read
[Live Webinar] Shift Left or Collaborate with Security?

[Live Webinar] Shift Left or Collaborate with Security?

5
Comments
3 min read
Solution for 'wazuh-agentd: ERROR: Invalid server address found: 'MANAGER_IP''

Solution for 'wazuh-agentd: ERROR: Invalid server address found: 'MANAGER_IP''

5
Comments
2 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

10
Comments
2 min read
Policy Sentry - IAM Least Privilege Policy Generator

Policy Sentry - IAM Least Privilege Policy Generator

10
Comments
8 min read
Building a Security-First Culture As A Developer or Team

Building a Security-First Culture As A Developer or Team

6
Comments
2 min read
Manually Updating .env Files Isn't DevOps

Manually Updating .env Files Isn't DevOps

8
Comments
7 min read
Running Tomcat on Privileged Ports

Running Tomcat on Privileged Ports

8
Comments
3 min read
A technical tale of NodeSecure - Chapter 2

A technical tale of NodeSecure - Chapter 2

7
Comments
6 min read
Define Amazon Cognito as authoriser for lambda function in serverless using shared API Gateway 🚀

Define Amazon Cognito as authoriser for lambda function in serverless using shared API Gateway 🚀

7
Comments
3 min read
Delegate Call - Context is Preserved

Delegate Call - Context is Preserved

6
Comments
1 min read
How to ask for payment when finding security issues in a big website

How to ask for payment when finding security issues in a big website

5
Comments 6
1 min read
PyScript XSS

PyScript XSS

7
Comments
1 min read
Understanding JWT

Understanding JWT

51
Comments 6
4 min read
Delegate Call - Order of Variables

Delegate Call - Order of Variables

6
Comments
2 min read
Hack The Box Writeup: Cronos

Hack The Box Writeup: Cronos

7
Comments
10 min read
Ruby cryptographic gems

Ruby cryptographic gems

8
Comments
3 min read
Cloudsplaining - AWS IAM Security Assessment Tool

Cloudsplaining - AWS IAM Security Assessment Tool

13
Comments
9 min read
Code Smell 138 - Packages Dependency

Code Smell 138 - Packages Dependency

7
Comments
2 min read
Understanding CSRF Attacks

Understanding CSRF Attacks

197
Comments 5
11 min read
Why your API should explicitly take resource owner id as a parameter instead of inferring from authentication.

Why your API should explicitly take resource owner id as a parameter instead of inferring from authentication.

8
Comments
3 min read
GitHub Personal Access Tokens (PAT)

GitHub Personal Access Tokens (PAT)

3
Comments 1
3 min read
Web Crawling VS Web Scraping: What Is the Difference?

Web Crawling VS Web Scraping: What Is the Difference?

7
Comments 3
4 min read
What is DevSecOps? Shift security left in your DevOps lifecycle

What is DevSecOps? Shift security left in your DevOps lifecycle

3
Comments
4 min read
What is Identity : Auth0

What is Identity : Auth0

4
Comments
1 min read
Linux Security Modules

Linux Security Modules

2
Comments
6 min read
Is web scraping legal?

Is web scraping legal?

7
Comments 2
17 min read
Penetration Testing Stages and Methodologies

Penetration Testing Stages and Methodologies

2
Comments 1
2 min read
Replace a JPA entity with a DTO

Replace a JPA entity with a DTO

11
Comments 2
4 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
LGPD e falsear dados sensíveis no banco de dados de dev e staging - parte 1

LGPD e falsear dados sensíveis no banco de dados de dev e staging - parte 1

5
Comments
5 min read
OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Securing our internal tools

Securing our internal tools

10
Comments
2 min read
What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
AWS Security Stories #02: AWS Trusted Advisor

AWS Security Stories #02: AWS Trusted Advisor

Comments
1 min read
Enforcing encryption standards on S3-objects

Enforcing encryption standards on S3-objects

10
Comments
6 min read
Security in Laravel: How to Protect Your App Part 4

Security in Laravel: How to Protect Your App Part 4

12
Comments 1
1 min read
Carbon - Python Renamer

Carbon - Python Renamer

5
Comments 1
1 min read
Types of Steganography methods that are used for hiding confidential data.

Types of Steganography methods that are used for hiding confidential data.

8
Comments
4 min read
Prevent External Contracts

Prevent External Contracts

6
Comments
2 min read
AWS Security Stories #01: Virtual Patching

AWS Security Stories #01: Virtual Patching

3
Comments
3 min read
Scaled Virus Scanner using AWS Fargate, ClamAV, S3, and SQS with Terraform

Scaled Virus Scanner using AWS Fargate, ClamAV, S3, and SQS with Terraform

11
Comments 7
8 min read
Where can I find regex to prevent code injection?

Where can I find regex to prevent code injection?

2
Comments 3
1 min read
Security in Laravel: How to Protect Your App Part 3

Security in Laravel: How to Protect Your App Part 3

10
Comments 1
2 min read
Stop putting AWS credentials in the credentials file

Stop putting AWS credentials in the credentials file

19
Comments
6 min read
Update Firefox products now to fix critical vulnerabilities

Update Firefox products now to fix critical vulnerabilities

6
Comments
1 min read
HackTheBox Pandora Walkthrough

HackTheBox Pandora Walkthrough

5
Comments
17 min read
Careful while using tx.origin

Careful while using tx.origin

7
Comments
2 min read
Security in Laravel: How to Protect Your App Part 2

Security in Laravel: How to Protect Your App Part 2

11
Comments 1
1 min read
Bug Bounty vs. Security Scanner

Bug Bounty vs. Security Scanner

7
Comments
2 min read
loading...