DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
When Package Dependencies Become Problematic

When Package Dependencies Become Problematic

6
Comments
6 min read
AWS Inspector and AWS Config - step by step towards more security

AWS Inspector and AWS Config - step by step towards more security

3
Comments
5 min read
Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins

Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins

2
Comments
7 min read
Secure your cloud with Cloudsploit!

Secure your cloud with Cloudsploit!

11
Comments
7 min read
Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does

Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does

7
Comments
5 min read
Hashing a Password in NodeJs

Hashing a Password in NodeJs

3
Comments
1 min read
Environment Variables in Python

Environment Variables in Python

6
Comments
1 min read
Sessions: cookies vs localStorage - which one to use when

Sessions: cookies vs localStorage - which one to use when

8
Comments
3 min read
Firewall: Egress Filtering with ufw

Firewall: Egress Filtering with ufw

5
Comments
4 min read
Effective Session Management using Supertokens

Effective Session Management using Supertokens

134
Comments 3
7 min read
Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice

Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice

7
Comments
18 min read
Scan and secure AWS Lambda credentials like a pro!

Scan and secure AWS Lambda credentials like a pro!

7
Comments
3 min read
Amazon CloudFront 🌩️ - An Global Edge Network

Amazon CloudFront 🌩️ - An Global Edge Network

14
Comments
2 min read
Add Hongkong Post Root CA certificate to Java keystore

Add Hongkong Post Root CA certificate to Java keystore

6
Comments
1 min read
Coordinated vulnerability disclosure (CVD) for open source projects

Coordinated vulnerability disclosure (CVD) for open source projects

11
Comments 3
9 min read
Automated attack synthesis by extracting protocol FSMs from RFCs

Automated attack synthesis by extracting protocol FSMs from RFCs

13
Comments 2
8 min read
Web Cache Deception

Web Cache Deception

5
Comments
1 min read
Kubernetes Cluster Authentication using AWS IAM

Kubernetes Cluster Authentication using AWS IAM

8
Comments
3 min read
Reconnaissance with OSINT technologies

Reconnaissance with OSINT technologies

6
Comments
1 min read
Supabase Date Protection on PostgreSQL

Supabase Date Protection on PostgreSQL

17
Comments
3 min read
Create Biometric-Powered Login Pages in Vue.js

Create Biometric-Powered Login Pages in Vue.js

14
Comments
7 min read
Unsung HERO - AWS SG

Unsung HERO - AWS SG

20
Comments
3 min read
OpenAPI Security

OpenAPI Security

3
Comments
2 min read
All Things Security - Dockerizing Django for Deploying Anywhere

All Things Security - Dockerizing Django for Deploying Anywhere

26
Comments
11 min read
NodeSecure - What's new in 2022 ?

NodeSecure - What's new in 2022 ?

11
Comments
3 min read
A BadUSB that isn't so bad: Making a keystroke injector in Arduino that automates GatherTown movements

A BadUSB that isn't so bad: Making a keystroke injector in Arduino that automates GatherTown movements

6
Comments
1 min read
How to take backup of a database through SSH tunneling

How to take backup of a database through SSH tunneling

8
Comments
2 min read
The computer can’t update with «Update and shut down» or «Update and restart» in Windows 10, how to fix it?

The computer can’t update with «Update and shut down» or «Update and restart» in Windows 10, how to fix it?

2
Comments
5 min read
A quick auth0/express/heroku setup

A quick auth0/express/heroku setup

5
Comments 1
1 min read
What are MetaMask "Accounts" or "Sub-Accounts"? And why are they not as private as they are supposed to be?

What are MetaMask "Accounts" or "Sub-Accounts"? And why are they not as private as they are supposed to be?

2
Comments
4 min read
How to fix the error «The file or directory is corrupted and unreadable»?

How to fix the error «The file or directory is corrupted and unreadable»?

2
Comments
5 min read
Implementing a safe and sound API Key authorization middleware in Go

Implementing a safe and sound API Key authorization middleware in Go

14
Comments 1
8 min read
How to troubleshoot CORS Preflight / Options errors in 2022

How to troubleshoot CORS Preflight / Options errors in 2022

5
Comments
2 min read
PORT SCANNING | nmap, connect()

PORT SCANNING | nmap, connect()

6
Comments
7 min read
React.js - Indicateur de "force" d'un mot de passe

React.js - Indicateur de "force" d'un mot de passe

7
Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

3
Comments
3 min read
How to Secure Nginx WeB-Server From HACKERs | Tip

How to Secure Nginx WeB-Server From HACKERs | Tip

2
Comments 1
1 min read
Fixing vulnerabilities found in a dependency tree

Fixing vulnerabilities found in a dependency tree

3
Comments
2 min read
Safely Handling JWTs

Safely Handling JWTs

55
Comments 3
9 min read
Symmetric vs. Asymmetric Encryption

Symmetric vs. Asymmetric Encryption

5
Comments
2 min read
Implementa Auth0 Tokens como un campeĂłn

Implementa Auth0 Tokens como un campeĂłn

6
Comments
2 min read
Descubra o que Ă© ransomware e saiba como manter seus dados seguros

Descubra o que Ă© ransomware e saiba como manter seus dados seguros

3
Comments
5 min read
Introducing the AWS Firewall Factory

Introducing the AWS Firewall Factory

10
Comments 2
3 min read
A simple buffer overflow exploit

A simple buffer overflow exploit

4
Comments
4 min read
Go language

Go language

7
Comments
1 min read
How I Hacked Kerala Road Transport Corporation(KSRTC)?

How I Hacked Kerala Road Transport Corporation(KSRTC)?

7
Comments 1
3 min read
Password Protect Static Sites with PageCrypt

Password Protect Static Sites with PageCrypt

7
Comments
5 min read
Connect to your EC2 instance using SSH the modern way

Connect to your EC2 instance using SSH the modern way

8
Comments
5 min read
Containerless! How to Run WebAssembly Workloads on Kubernetes with Rust

Containerless! How to Run WebAssembly Workloads on Kubernetes with Rust

75
Comments 7
11 min read
Secure your AWS account

Secure your AWS account

3
Comments
7 min read
đź”’ Make your JavaScript project safer by using this workflow

đź”’ Make your JavaScript project safer by using this workflow

17
Comments
3 min read
Differences between the 6 types of Hackers

Differences between the 6 types of Hackers

8
Comments
2 min read
Dealing with Discord Malicious Domains

Dealing with Discord Malicious Domains

2
Comments
1 min read
Cross-Site Scripting (XSS) Vulnerabilities (3 Tips to prevent it)

Cross-Site Scripting (XSS) Vulnerabilities (3 Tips to prevent it)

29
Comments 2
3 min read
How to get a job as a AWS Pentester?

How to get a job as a AWS Pentester?

2
Comments
4 min read
What Hackers Know About Your Software Supply Chain (That You Don’t)

What Hackers Know About Your Software Supply Chain (That You Don’t)

3
Comments 1
2 min read
Trusting in your IaC -Terraform-Compliance

Trusting in your IaC -Terraform-Compliance

13
Comments 4
5 min read
Acra. Features: Authentication

Acra. Features: Authentication

8
Comments
1 min read
Configurar alertas en Database Migration Service

Configurar alertas en Database Migration Service

2
Comments
5 min read
A Serverless API to validate AWS Access Keys based on AWS SAM

A Serverless API to validate AWS Access Keys based on AWS SAM

6
Comments
9 min read
loading...