DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JWTs explained with code examples

JWTs explained with code examples

19
Comments 1
6 min read
A first update on our salary survey

A first update on our salary survey

2
Comments
2 min read
Um Guia sobre Gerenciadores de Senhas

Um Guia sobre Gerenciadores de Senhas

6
Comments
4 min read
The Things to Keep in Mind about Auth

The Things to Keep in Mind about Auth

36
Comments
8 min read
How to bypass input filter

How to bypass input filter

2
Comments
2 min read
Security news weekly round-up - 29th October 2021

Security news weekly round-up - 29th October 2021

3
Comments 2
3 min read
A few simple ways to protect your digital privacy

A few simple ways to protect your digital privacy

2
Comments
2 min read
Read Certificate from Key Vault from Azure App Service by using Managed Identity

Read Certificate from Key Vault from Azure App Service by using Managed Identity

4
Comments
1 min read
Pentest/networking project

Pentest/networking project

6
Comments
1 min read
Brief ETH Wallet Security Guide

Brief ETH Wallet Security Guide

4
Comments
8 min read
Delegating IAM access with permission boundary

Delegating IAM access with permission boundary

3
Comments
5 min read
Encrypt/decrypt data with .NET 6 and Azure Key Vault

Encrypt/decrypt data with .NET 6 and Azure Key Vault

27
Comments
6 min read
Security Alarm System using a Bipolar Junction Transistor Switch

Security Alarm System using a Bipolar Junction Transistor Switch

2
Comments 1
2 min read
A solution to rEFInd unable to load using shim when Secure Boot is enabled

A solution to rEFInd unable to load using shim when Secure Boot is enabled

7
Comments 1
2 min read
AMAZON COGNITO

AMAZON COGNITO

6
Comments
1 min read
AWS Security Digest

AWS Security Digest

3
Comments
1 min read
How To Manage Encryption at Scale?

How To Manage Encryption at Scale?

2
Comments
6 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

3
Comments
4 min read
A Checklist to Quickly Evaluate SaaS Security

A Checklist to Quickly Evaluate SaaS Security

3
Comments
4 min read
Blink Host | Auth0 CTF Write-up

Blink Host | Auth0 CTF Write-up

5
Comments 1
5 min read
Little known vulnerability with ORMs and query builders

Little known vulnerability with ORMs and query builders

5
Comments
3 min read
Understanding Authentication and Authorization

Understanding Authentication and Authorization

5
Comments
3 min read
TIL: How to use GraphQL variables to give my queries type safety

TIL: How to use GraphQL variables to give my queries type safety

69
Comments
6 min read
Web App Security, Understanding the Meaning of the BFF Pattern

Web App Security, Understanding the Meaning of the BFF Pattern

112
Comments 15
9 min read
How to Create Secrets in Python

How to Create Secrets in Python

2
Comments
1 min read
ThreatMapper - Open Source Runtime Threat Scanner

ThreatMapper - Open Source Runtime Threat Scanner

9
Comments
2 min read
How cryptography 💪works to protect ML models 02:05

How cryptography 💪works to protect ML models

11
Comments
2 min read
Introduction to the world of Cybersecurity.

Introduction to the world of Cybersecurity.

9
Comments
4 min read
How to Fix Damaged «Excel» or «Word» Files That Won’t Open?

How to Fix Damaged «Excel» or «Word» Files That Won’t Open?

6
Comments
11 min read
𝑵𝒆𝒘 𝑲𝒖𝒃𝒆𝒓𝒏𝒆𝒕𝒆𝒔 𝒉𝒊𝒈𝒉 𝒔𝒆𝒗𝒆𝒓𝒊𝒕𝒚 𝒗𝒖𝒍𝒏𝒆𝒓𝒂𝒃𝒊𝒍𝒊𝒕𝒚 𝒂𝒍𝒆𝒓𝒕: 𝑪𝑽𝑬-2021-25742 about Nginx Ingress controller custom snippets

𝑵𝒆𝒘 𝑲𝒖𝒃𝒆𝒓𝒏𝒆𝒕𝒆𝒔 𝒉𝒊𝒈𝒉 𝒔𝒆𝒗𝒆𝒓𝒊𝒕𝒚 𝒗𝒖𝒍𝒏𝒆𝒓𝒂𝒃𝒊𝒍𝒊𝒕𝒚 𝒂𝒍𝒆𝒓𝒕: 𝑪𝑽𝑬-2021-25742 about Nginx Ingress controller custom snippets

4
Comments
2 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

12
Comments
3 min read
Be safe with the SSH version you use — for Roadrunners

Be safe with the SSH version you use — for Roadrunners

8
Comments
2 min read
Use OpenShift secret securely without any third party tool

Use OpenShift secret securely without any third party tool

9
Comments
5 min read
Your Privacy is Haux!

Your Privacy is Haux!

3
Comments
1 min read
Stop Your Password From Opening The Door To Hackers

Stop Your Password From Opening The Door To Hackers

11
Comments 2
3 min read
Why do we need all of this data? OWASP Privacy Risks - P-10

Why do we need all of this data? OWASP Privacy Risks - P-10

3
Comments
2 min read
Security news weekly round-up - 22nd October 2021

Security news weekly round-up - 22nd October 2021

3
Comments 1
4 min read
Cloud Collective: Real-time Data Integration with Webhooks

Cloud Collective: Real-time Data Integration with Webhooks

2
Comments
1 min read
10 no-brainer best practices that boost API security

10 no-brainer best practices that boost API security

2
Comments
5 min read
We're Lacework. We care about security.

We're Lacework. We care about security.

11
Comments
2 min read
I will be notified if you click this 😈

I will be notified if you click this 😈

62
Comments 9
2 min read
AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

13
Comments
4 min read
Authority in Security

Authority in Security

4
Comments
4 min read
Bypassing ModSecurity WAF

Bypassing ModSecurity WAF

4
Comments
2 min read
Secure Your Data with AES 256 bit Encryption and Decryption method using PHP

Secure Your Data with AES 256 bit Encryption and Decryption method using PHP

12
Comments
1 min read
Rethinking analytics

Rethinking analytics

3
Comments
3 min read
What is Cybersecurity?

What is Cybersecurity?

2
Comments
1 min read
Secure Password Handling in Python

Secure Password Handling in Python

22
Comments
9 min read
The ins and outs of JWTs

The ins and outs of JWTs

25
Comments
7 min read
Securely erase your hard drive or SSD for free

Securely erase your hard drive or SSD for free

12
Comments 1
6 min read
Kubernetes Security Checklist 2021

Kubernetes Security Checklist 2021

7
Comments
7 min read
Integrating Vercel with Doppler: Sync Secrets in Production

Integrating Vercel with Doppler: Sync Secrets in Production

8
Comments
3 min read
Best ways to Connect APIs on the frontend

Best ways to Connect APIs on the frontend

143
Comments 1
4 min read
7 Easy-to-Follow Best Practices for Writing Dockerfile

7 Easy-to-Follow Best Practices for Writing Dockerfile

149
Comments
6 min read
How to Encrypt and Decrypt in Node JS using Crypto

How to Encrypt and Decrypt in Node JS using Crypto

6
Comments
1 min read
How to build a Password Manager with Node.js : Part - 1

How to build a Password Manager with Node.js : Part - 1

23
Comments
4 min read
Authentication bypass in cryptography library

Authentication bypass in cryptography library

5
Comments
3 min read
Security news weekly round-up - 15th October 2021

Security news weekly round-up - 15th October 2021

2
Comments 2
4 min read
Why detecting generic credentials is a game changer

Why detecting generic credentials is a game changer

6
Comments
6 min read
Securing access to Scaleway Elements API Keys from Gitlab CI

Securing access to Scaleway Elements API Keys from Gitlab CI

6
Comments
6 min read
loading...