DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Verdade sobre Cybersegurança e LGPD

A Verdade sobre Cybersegurança e LGPD

3
Comments
14 min read
AWS re:Invent 2021 recap by a DevTools Hero

AWS re:Invent 2021 recap by a DevTools Hero

9
Comments
7 min read
AWS Certified Security - Specialty | Incident response (notes)

AWS Certified Security - Specialty | Incident response (notes)

3
Comments
3 min read
Understand your unauthenticated & public AWS API Gateway exposure

Understand your unauthenticated & public AWS API Gateway exposure

7
Comments
2 min read
How to store passwords in db?

How to store passwords in db?

2
Comments
2 min read
Setup an IAM user in AWS via CLI

Setup an IAM user in AWS via CLI

7
Comments
4 min read
What is AWS Security Hub?

What is AWS Security Hub?

5
Comments
1 min read
hawk project

hawk project

10
Comments
1 min read
Cyber security essentials

Cyber security essentials

7
Comments
4 min read
Strengthen your Android or iOS Application Security using MobSF - Learn by example (2021)

Strengthen your Android or iOS Application Security using MobSF - Learn by example (2021)

5
Comments
9 min read
Open Source Runtime Exploitability Management with ThreatMapper

Open Source Runtime Exploitability Management with ThreatMapper

6
Comments
1 min read
Integrate APIs Without a Backend

Integrate APIs Without a Backend

44
Comments 1
6 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

8
Comments
2 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

8
Comments
3 min read
Supply Chain Attacks: 6 Steps to protect your software supply chain

Supply Chain Attacks: 6 Steps to protect your software supply chain

3
Comments
11 min read
Hawk

Hawk

4
Comments
1 min read
Flask user authentication with JWT

Flask user authentication with JWT

7
Comments 2
1 min read
Are passwords still worth it?

Are passwords still worth it?

12
Comments
3 min read
Serverless security hazards and trends to consider

Serverless security hazards and trends to consider

5
Comments
7 min read
Hawk Open Source Project

Hawk Open Source Project

6
Comments
1 min read
GCP security best practices

GCP security best practices

14
Comments 1
14 min read
10 Ways to Improve Your PHP Security

10 Ways to Improve Your PHP Security

11
Comments 3
6 min read
Two Methods to Scan for PII in Data Warehouses

Two Methods to Scan for PII in Data Warehouses

3
Comments
5 min read
[Infographics] Securing serverless architectures

[Infographics] Securing serverless architectures

4
Comments
1 min read
Simple Python Program To Find IP Address

Simple Python Program To Find IP Address

2
Comments 2
1 min read
AWS: Trusted Advisor, part 1 — its features overview

AWS: Trusted Advisor, part 1 — its features overview

2
Comments
4 min read
Geofence your self-hosted web server and API's

Geofence your self-hosted web server and API's

17
Comments
5 min read
Secure Web applications using CryptoJS and PHP

Secure Web applications using CryptoJS and PHP

24
Comments 1
2 min read
AWS SSO Tutorial with Google Workspace (Gsuite) as an IdP Step-by-Step

AWS SSO Tutorial with Google Workspace (Gsuite) as an IdP Step-by-Step

4
Comments
7 min read
Simple way to generate random string in PHP

Simple way to generate random string in PHP

6
Comments
1 min read
Mobile Security: OWASP List

Mobile Security: OWASP List

3
Comments
3 min read
Top 5 Best Android Apps and Games Download Sites in 2021

Top 5 Best Android Apps and Games Download Sites in 2021

5
Comments
3 min read
Password-Synchronization with Syncthing

Password-Synchronization with Syncthing

4
Comments
4 min read
Understanding User Authentication from Scratch

Understanding User Authentication from Scratch

24
Comments
5 min read
Generating Universally Unique Identifiers with JavaScript

Generating Universally Unique Identifiers with JavaScript

6
Comments
2 min read
Dependency Confusion - How can you hack Apple, Microsoft and dozens of other companies?

Dependency Confusion - How can you hack Apple, Microsoft and dozens of other companies?

3
Comments
1 min read
You are wasting resources by using classical surveillance

You are wasting resources by using classical surveillance

2
Comments
4 min read
AWS IAM managed policies for Amazon DynamoDB

AWS IAM managed policies for Amazon DynamoDB

8
Comments
1 min read
How I Hacked Shuttl 🚎

How I Hacked Shuttl 🚎

3
Comments
3 min read
New Java 17 features for improved security and serialization

New Java 17 features for improved security and serialization

3
Comments
6 min read
Horrifying Vulnerabilities in the Death/Birth Certificate System

Horrifying Vulnerabilities in the Death/Birth Certificate System

4
Comments
2 min read
CISO Roadmap: The First 90 Days

CISO Roadmap: The First 90 Days

3
Comments
8 min read
A technical tale of NodeSecure - Chapter 1

A technical tale of NodeSecure - Chapter 1

14
Comments
5 min read
How to Transfer a Website to a Different Host (Without Downtime or Issues)

How to Transfer a Website to a Different Host (Without Downtime or Issues)

14
Comments
5 min read
Hiding primary keys and database IDs using Hashids

Hiding primary keys and database IDs using Hashids

7
Comments
6 min read
Be Aware of the !-- script Bug

Be Aware of the !-- script Bug

19
Comments 14
1 min read
How to Prevent Unwanted File Recovery

How to Prevent Unwanted File Recovery

2
Comments
4 min read
Intigriti 1121 - XSS Challenge Writeup

Intigriti 1121 - XSS Challenge Writeup

7
Comments
10 min read
How to Save Your Photos When Traveling

How to Save Your Photos When Traveling

2
Comments
6 min read
APFS: Data Recovery Algorithm and File System Structure

APFS: Data Recovery Algorithm and File System Structure

5
Comments
4 min read
Is Singapore a Surveillance State?

Is Singapore a Surveillance State?

7
Comments 6
2 min read
CORS for a Twitch Extension

CORS for a Twitch Extension

3
Comments
6 min read
3+3 ASP.NET Mistakes (+ How to avoid them)

3+3 ASP.NET Mistakes (+ How to avoid them)

17
Comments 1
3 min read
Security news weekly round-up - 19th November 2021

Security news weekly round-up - 19th November 2021

3
Comments
4 min read
Can DevSecOps Tools Open Security Testing To Everyone?

Can DevSecOps Tools Open Security Testing To Everyone?

5
Comments
3 min read
GraphQL Auth without Middleware

GraphQL Auth without Middleware

29
Comments 2
8 min read
Insecure Direct Object Reference & How to Protect Against it

Insecure Direct Object Reference & How to Protect Against it

9
Comments
6 min read
DevSecOps Done RIGHT! Why and What to Do.

DevSecOps Done RIGHT! Why and What to Do.

23
Comments 2
11 min read
Artificial Intelligence Technology: AI Trends That Matter for Business

Artificial Intelligence Technology: AI Trends That Matter for Business

14
Comments
9 min read
AWS Cognito Pricing and Features – 2021

AWS Cognito Pricing and Features – 2021

7
Comments
3 min read
loading...