DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Continuous Container Vulnerability Testing With Trivy

Continuous Container Vulnerability Testing With Trivy

9
Comments
9 min read
How to be notified when a new tag has been created on a Docker Hub repository 📧

How to be notified when a new tag has been created on a Docker Hub repository 📧

3
Comments
2 min read
Authorization of a Twitch Extension

Authorization of a Twitch Extension

5
Comments
5 min read
API Security Explained! API Cybersecurity 101

API Security Explained! API Cybersecurity 101

8
Comments
6 min read
How to Prevent Data Exfiltration with eBPF

How to Prevent Data Exfiltration with eBPF

8
Comments
4 min read
Daily Ethernaut Challenge - #3 CoinFlip

Daily Ethernaut Challenge - #3 CoinFlip

5
Comments
3 min read
Top 7 Security Features For Video Streaming Platform

Top 7 Security Features For Video Streaming Platform

4
Comments 5
4 min read
How to Create Four Types of VPN’s Quickly with Wireguard® and Netmaker

How to Create Four Types of VPN’s Quickly with Wireguard® and Netmaker

10
Comments 3
10 min read
Setting up AWS Appsync for unauthenticated users

Setting up AWS Appsync for unauthenticated users

7
Comments
2 min read
Easy breached password detection

Easy breached password detection

5
Comments
2 min read
Steering clear of the dependency trap

Steering clear of the dependency trap

37
Comments 2
5 min read
Next.js Full Example of Next-Iron-Session with Mongoose

Next.js Full Example of Next-Iron-Session with Mongoose

21
Comments 2
6 min read
Easy Crack

Easy Crack

4
Comments 1
4 min read
WordPress: How to disable XMLRPC

WordPress: How to disable XMLRPC

5
Comments
1 min read
Intigriti 1021 - XSS Challenge Writeup

Intigriti 1021 - XSS Challenge Writeup

8
Comments
4 min read
Adding TLS to Pi-hole

Adding TLS to Pi-hole

5
Comments
2 min read
Can you find the bug in this piece of php code? 🤹

Can you find the bug in this piece of php code? 🤹

82
Comments 28
1 min read
Hawk Open Source Project

Hawk Open Source Project

6
Comments
1 min read
JWTs explained with code examples

JWTs explained with code examples

19
Comments 1
6 min read
A first update on our salary survey

A first update on our salary survey

2
Comments
2 min read
Um Guia sobre Gerenciadores de Senhas

Um Guia sobre Gerenciadores de Senhas

6
Comments
4 min read
The Things to Keep in Mind about Auth

The Things to Keep in Mind about Auth

36
Comments
8 min read
How to bypass input filter

How to bypass input filter

2
Comments
2 min read
Security news weekly round-up - 29th October 2021

Security news weekly round-up - 29th October 2021

3
Comments 2
3 min read
A few simple ways to protect your digital privacy

A few simple ways to protect your digital privacy

2
Comments
2 min read
Read Certificate from Key Vault from Azure App Service by using Managed Identity

Read Certificate from Key Vault from Azure App Service by using Managed Identity

4
Comments
1 min read
Pentest/networking project

Pentest/networking project

6
Comments
1 min read
Brief ETH Wallet Security Guide

Brief ETH Wallet Security Guide

4
Comments
8 min read
Delegating IAM access with permission boundary

Delegating IAM access with permission boundary

3
Comments
5 min read
Encrypt/decrypt data with .NET 6 and Azure Key Vault

Encrypt/decrypt data with .NET 6 and Azure Key Vault

27
Comments
6 min read
Security Alarm System using a Bipolar Junction Transistor Switch

Security Alarm System using a Bipolar Junction Transistor Switch

2
Comments 1
2 min read
A solution to rEFInd unable to load using shim when Secure Boot is enabled

A solution to rEFInd unable to load using shim when Secure Boot is enabled

7
Comments 1
2 min read
AMAZON COGNITO

AMAZON COGNITO

6
Comments
1 min read
AWS Security Digest

AWS Security Digest

3
Comments
1 min read
How To Manage Encryption at Scale?

How To Manage Encryption at Scale?

2
Comments
6 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

3
Comments
4 min read
A Checklist to Quickly Evaluate SaaS Security

A Checklist to Quickly Evaluate SaaS Security

3
Comments
4 min read
Blink Host | Auth0 CTF Write-up

Blink Host | Auth0 CTF Write-up

5
Comments 1
5 min read
Little known vulnerability with ORMs and query builders

Little known vulnerability with ORMs and query builders

5
Comments
3 min read
Understanding Authentication and Authorization

Understanding Authentication and Authorization

5
Comments
3 min read
TIL: How to use GraphQL variables to give my queries type safety

TIL: How to use GraphQL variables to give my queries type safety

69
Comments
6 min read
Web App Security, Understanding the Meaning of the BFF Pattern

Web App Security, Understanding the Meaning of the BFF Pattern

112
Comments 15
9 min read
How to Create Secrets in Python

How to Create Secrets in Python

2
Comments
1 min read
ThreatMapper - Open Source Runtime Threat Scanner

ThreatMapper - Open Source Runtime Threat Scanner

9
Comments
2 min read
How cryptography 💪works to protect ML models 02:05

How cryptography 💪works to protect ML models

11
Comments
2 min read
Introduction to the world of Cybersecurity.

Introduction to the world of Cybersecurity.

9
Comments
4 min read
How to Fix Damaged «Excel» or «Word» Files That Won’t Open?

How to Fix Damaged «Excel» or «Word» Files That Won’t Open?

6
Comments
11 min read
𝑵𝒆𝒘 𝑲𝒖𝒃𝒆𝒓𝒏𝒆𝒕𝒆𝒔 𝒉𝒊𝒈𝒉 𝒔𝒆𝒗𝒆𝒓𝒊𝒕𝒚 𝒗𝒖𝒍𝒏𝒆𝒓𝒂𝒃𝒊𝒍𝒊𝒕𝒚 𝒂𝒍𝒆𝒓𝒕: 𝑪𝑽𝑬-2021-25742 about Nginx Ingress controller custom snippets

𝑵𝒆𝒘 𝑲𝒖𝒃𝒆𝒓𝒏𝒆𝒕𝒆𝒔 𝒉𝒊𝒈𝒉 𝒔𝒆𝒗𝒆𝒓𝒊𝒕𝒚 𝒗𝒖𝒍𝒏𝒆𝒓𝒂𝒃𝒊𝒍𝒊𝒕𝒚 𝒂𝒍𝒆𝒓𝒕: 𝑪𝑽𝑬-2021-25742 about Nginx Ingress controller custom snippets

4
Comments
2 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

12
Comments
3 min read
Be safe with the SSH version you use — for Roadrunners

Be safe with the SSH version you use — for Roadrunners

8
Comments
2 min read
Use OpenShift secret securely without any third party tool

Use OpenShift secret securely without any third party tool

9
Comments
5 min read
Your Privacy is Haux!

Your Privacy is Haux!

3
Comments
1 min read
Stop Your Password From Opening The Door To Hackers

Stop Your Password From Opening The Door To Hackers

11
Comments 2
3 min read
Why do we need all of this data? OWASP Privacy Risks - P-10

Why do we need all of this data? OWASP Privacy Risks - P-10

3
Comments
2 min read
Security news weekly round-up - 22nd October 2021

Security news weekly round-up - 22nd October 2021

3
Comments 1
4 min read
Cloud Collective: Real-time Data Integration with Webhooks

Cloud Collective: Real-time Data Integration with Webhooks

2
Comments
1 min read
10 no-brainer best practices that boost API security

10 no-brainer best practices that boost API security

2
Comments
5 min read
We're Lacework. We care about security.

We're Lacework. We care about security.

11
Comments
2 min read
AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

13
Comments
4 min read
I will be notified if you click this 😈

I will be notified if you click this 😈

62
Comments 9
2 min read
loading...