DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Install Kali Linux on VirtualBox: A Step-by-Step Guide

How to Install Kali Linux on VirtualBox: A Step-by-Step Guide

11
Comments
4 min read
Introduction to Cybersecurity Tools & Cyber Attacks

Introduction to Cybersecurity Tools & Cyber Attacks

26
Comments 1
6 min read
Secure API Keys on the Frontend - Vue JS

Secure API Keys on the Frontend - Vue JS

27
Comments 6
4 min read
Integrate APIs with your HTML Site without a Backend.

Integrate APIs with your HTML Site without a Backend.

11
Comments
3 min read
Network Security & Database Vulnerabilities

Network Security & Database Vulnerabilities

3
Comments
8 min read
How to list Azure VM potentially affected by the OMI RCE

How to list Azure VM potentially affected by the OMI RCE

4
Comments 1
1 min read
Database testing: why and how to perform unit testing

Database testing: why and how to perform unit testing

5
Comments
7 min read
Firestore Counters - Everything There is to Know!

Firestore Counters - Everything There is to Know!

6
Comments
7 min read
Using password_hash to Hash and Store Passwords in PHP

Using password_hash to Hash and Store Passwords in PHP

6
Comments
2 min read
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

6
Comments
4 min read
Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

2
Comments
4 min read
Zero Trust: Is it anything new?

Zero Trust: Is it anything new?

3
Comments
9 min read
CTFs are Fun

CTFs are Fun

2
Comments 1
1 min read
Protect your Repository from Azure Pipelines!

Protect your Repository from Azure Pipelines!

6
Comments
3 min read
SMALI, What's That?

SMALI, What's That?

2
Comments
3 min read
2FA with FIDO U2F / OTP / HOTP / TOTP

2FA with FIDO U2F / OTP / HOTP / TOTP

6
Comments
5 min read
Learning about SQL Injection

Learning about SQL Injection

6
Comments
5 min read
Encrypt your crucial data into Image file

Encrypt your crucial data into Image file

5
Comments 1
1 min read
To GraphQL or not to GraphQL? Pros and Cons

To GraphQL or not to GraphQL? Pros and Cons

100
Comments 5
14 min read
🛡🔑 Secretlint 4.0.0: Support ESM rule and secretlint-disable directive

🛡🔑 Secretlint 4.0.0: Support ESM rule and secretlint-disable directive

2
Comments
2 min read
OWASP Top 10 for Developers: Using Components with Known Vulnerabilities

OWASP Top 10 for Developers: Using Components with Known Vulnerabilities

4
Comments
2 min read
Ransomware in the Cloud: What are the risks and how do you avoid them?

Ransomware in the Cloud: What are the risks and how do you avoid them?

2
Comments
5 min read
มาสร้างความแข็งแกร่งและปลอดภัยให้กับข้อมูลที่เก็บไว้ใน Amazon S3 กัน

มาสร้างความแข็งแกร่งและปลอดภัยให้กับข้อมูลที่เก็บไว้ใน Amazon S3 กัน

8
Comments 3
2 min read
Intro to Doppler: Real-life Use Case

Intro to Doppler: Real-life Use Case

37
Comments 4
5 min read
Data privacy: "We value your privacy" - No you don't

Data privacy: "We value your privacy" - No you don't

10
Comments 4
7 min read
Computer Vision Startups Enhancing Security & Surveillance

Computer Vision Startups Enhancing Security & Surveillance

5
Comments 3
5 min read
Free courses for September

Free courses for September

7
Comments
1 min read
What is OAuth?

What is OAuth?

4
Comments 1
2 min read
Considerations in Building Enclaves for Multiparty Computation (Part 2)

Considerations in Building Enclaves for Multiparty Computation (Part 2)

3
Comments
6 min read
Announcing new NodeSecure back-end

Announcing new NodeSecure back-end

34
Comments 2
4 min read
Control inbound/outbound traffic to an AWS Resource using AWS Security Groups

Control inbound/outbound traffic to an AWS Resource using AWS Security Groups

2
Comments
1 min read
How to deploy a strict Content Security Policy (CSP) with Next.js

How to deploy a strict Content Security Policy (CSP) with Next.js

9
Comments 3
3 min read
Utilizando o Session Manager - AWS System Manager

Utilizando o Session Manager - AWS System Manager

5
Comments
3 min read
Why Every Web Developer Should Learn About Security

Why Every Web Developer Should Learn About Security

163
Comments 8
3 min read
Kessel Run: Smuggling DevOps into the Department of Defense

Kessel Run: Smuggling DevOps into the Department of Defense

23
Comments 3
6 min read
End-to-End Encryption through Kafka - using Rust

End-to-End Encryption through Kafka - using Rust

36
Comments 1
9 min read
Security news weekly round-up - 10th September 2021

Security news weekly round-up - 10th September 2021

4
Comments
3 min read
Tor - the dark web driver

Tor - the dark web driver

4
Comments 1
2 min read
AWS Security Analytics Bootstrap

AWS Security Analytics Bootstrap

2
Comments
1 min read
A Little guide of Spring Web(MVC) with Custom Security for REST API

A Little guide of Spring Web(MVC) with Custom Security for REST API

3
Comments
3 min read
Django (DRF) 12 Factor App with examples

Django (DRF) 12 Factor App with examples

6
Comments
1 min read
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas

AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas

8
Comments
3 min read
How to use Captcha on localhost?

How to use Captcha on localhost?

9
Comments 1
1 min read
Choosing an authentication strategy with Fauna

Choosing an authentication strategy with Fauna

4
Comments
5 min read
Learn how to create a secure mobile application.

Learn how to create a secure mobile application.

4
Comments
3 min read
DevSecOps built-up series (Part I)

DevSecOps built-up series (Part I)

5
Comments
1 min read
Securing a .NET 4.6.x API with OpenID Connect

Securing a .NET 4.6.x API with OpenID Connect

5
Comments
3 min read
How Visual Studio 2022 ate up 100 GB of memory and what XML bombs had to do with it

How Visual Studio 2022 ate up 100 GB of memory and what XML bombs had to do with it

33
Comments 7
6 min read
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021

AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021

7
Comments
3 min read
Encoding vs encryption for 📱iOS app devs 00:45

Encoding vs encryption for 📱iOS app devs

22
Comments 1
2 min read
Using VPN Protection Online: A Beginner's Guide

Using VPN Protection Online: A Beginner's Guide

9
Comments 2
3 min read
Shorter release cycles through improved security

Shorter release cycles through improved security

2
Comments
5 min read
Python-dotenv (Keep your secrets safe)

Python-dotenv (Keep your secrets safe)

96
Comments 7
2 min read
1.13 Ensure there is only one activeaccess key available for any single IAM user

1.13 Ensure there is only one activeaccess key available for any single IAM user

5
Comments
1 min read
Cryptographic frequency Analysis explained

Cryptographic frequency Analysis explained

2
Comments
2 min read
Configure HTTP security response headers for Azure Static Web Apps

Configure HTTP security response headers for Azure Static Web Apps

17
Comments 2
1 min read
What is the difference between CORS and CSP?

What is the difference between CORS and CSP?

21
Comments 8
5 min read
Angular Security - Disable Inline Critical CSS

Angular Security - Disable Inline Critical CSS

5
Comments 2
2 min read
Open source is a valuable development resource. Give it your attention

Open source is a valuable development resource. Give it your attention

11
Comments
3 min read
The first tool to scan K8s clusters against the latest NSA hardening guidelines

The first tool to scan K8s clusters against the latest NSA hardening guidelines

1
Comments
1 min read
loading...