DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The first tool to scan K8s clusters against the latest NSA hardening guidelines

The first tool to scan K8s clusters against the latest NSA hardening guidelines

1
Comments
1 min read
Resumo sobre a versão 2 do serviço de metadados de instância AWS EC2 (IMDSv2)

Resumo sobre a versão 2 do serviço de metadados de instância AWS EC2 (IMDSv2)

7
Comments
3 min read
Setting up SSH keys for a new device - GitHub

Setting up SSH keys for a new device - GitHub

28
Comments 4
3 min read
AWS CIS Compliance in 15 minutes with 1 Command

AWS CIS Compliance in 15 minutes with 1 Command

14
Comments 1
2 min read
Discover all ip address connected to your network (Network scanner)

Discover all ip address connected to your network (Network scanner)

2
Comments
3 min read
Clickjacking explained

Clickjacking explained

4
Comments
5 min read
5 MUST KNOW Web Security Tips To Protect Your Web Apps From Hackers

5 MUST KNOW Web Security Tips To Protect Your Web Apps From Hackers

16
Comments
4 min read
Cookie authentication for AWS API Gateway WebSocket APIs

Cookie authentication for AWS API Gateway WebSocket APIs

2
Comments
4 min read
Security news weekly round-up - 3rd September 2021

Security news weekly round-up - 3rd September 2021

4
Comments
3 min read
Cross Site Request Forgery Explained

Cross Site Request Forgery Explained

2
Comments
5 min read
Signing Software The Easy Way with Sigstore and Cosign

Signing Software The Easy Way with Sigstore and Cosign

16
Comments 1
9 min read
PagerDuty and Teleport: System Access Only When You Need It

PagerDuty and Teleport: System Access Only When You Need It

1
Comments
4 min read
Is your AWS Account vulnerable to the newest attack presented at Black Hat 2021?

Is your AWS Account vulnerable to the newest attack presented at Black Hat 2021?

14
Comments
6 min read
Working with Vault and Golang

Working with Vault and Golang

19
Comments 1
2 min read
API - What Is API, How to do API Security Testing

API - What Is API, How to do API Security Testing

3
Comments
2 min read
Asymetric RSA encryption/decryption of your clipboard

Asymetric RSA encryption/decryption of your clipboard

2
Comments
2 min read
Presenting Enigma Reloaded(a self hosted, offline, DIY, encryption webapp)

Presenting Enigma Reloaded(a self hosted, offline, DIY, encryption webapp)

16
Comments 2
2 min read
Building Zero Trust with an API Gateway and Service Mesh

Building Zero Trust with an API Gateway and Service Mesh

52
Comments
6 min read
10 LIES that COMPANIES tell about CYBERSECURITY

10 LIES that COMPANIES tell about CYBERSECURITY

8
Comments
6 min read
How to configure AWS SSO enabling access for a user in two different AWS accounts using a customized user-portal

How to configure AWS SSO enabling access for a user in two different AWS accounts using a customized user-portal

18
Comments 2
9 min read
Introduction to Zero Trust on AWS ECS Fargate

Introduction to Zero Trust on AWS ECS Fargate

15
Comments 2
9 min read
SQL Injection 101

SQL Injection 101

14
Comments 3
5 min read
🍪Cookies and Cookie Tracking Explained

🍪Cookies and Cookie Tracking Explained

5
Comments
4 min read
Security: How to use Azure AD App Role for C# WebApi

Security: How to use Azure AD App Role for C# WebApi

9
Comments
5 min read
My 100 Days of Hacking !

My 100 Days of Hacking !

12
Comments 2
2 min read
Fun With Flags!

Fun With Flags!

2
Comments
4 min read
The Back-Pass Rule That Changed the Game

The Back-Pass Rule That Changed the Game

4
Comments
2 min read
How to setup SSL with Docker

How to setup SSL with Docker

16
Comments
2 min read
Password Generator With Bootstrap 5 And Javascript.

Password Generator With Bootstrap 5 And Javascript.

42
Comments 3
6 min read
How on earth does this work?

How on earth does this work?

3
Comments 2
1 min read
CockroachDB Grants and Schemas explained

CockroachDB Grants and Schemas explained

6
Comments
10 min read
Cryptanalysis- the study of breaking cryptosystems explained

Cryptanalysis- the study of breaking cryptosystems explained

2
Comments
4 min read
Passwordless SSH on Raspberry Pi

Passwordless SSH on Raspberry Pi

2
Comments
3 min read
Passwordless Mobile Authentication with Android

Passwordless Mobile Authentication with Android

3
Comments
7 min read
Tackling security vulnerability at an early stage in SDLC

Tackling security vulnerability at an early stage in SDLC

20
Comments 8
2 min read
Harden Apache2 Server

Harden Apache2 Server

7
Comments
4 min read
AzureFunBytes Episode 54 - @GitHub integration with @Azure and shifting left

AzureFunBytes Episode 54 - @GitHub integration with @Azure and shifting left

2
Comments
4 min read
XSS exploits explained

XSS exploits explained

9
Comments 3
2 min read
AzureFunBytes Reminder - @GitHub integration with @Azure and shifting left - 8/26/2021

AzureFunBytes Reminder - @GitHub integration with @Azure and shifting left - 8/26/2021

6
Comments
3 min read
XSS: attack, defense and C# programming

XSS: attack, defense and C# programming

8
Comments
11 min read
Active Directory Grupları

Active Directory Grupları

8
Comments
3 min read
How to assign Static IP on application load balancer using AWS Global Accelerator

How to assign Static IP on application load balancer using AWS Global Accelerator

15
Comments 7
10 min read
Block npm package threats using a dependency firewall

Block npm package threats using a dependency firewall

17
Comments 1
4 min read
TAURI FEATURE FREEZE AND SECURITY AUDIT

TAURI FEATURE FREEZE AND SECURITY AUDIT

32
Comments
2 min read
Stephen Schmidt Keynote at re:Inforce 2021

Stephen Schmidt Keynote at re:Inforce 2021

8
Comments
2 min read
"Support for password authentication was removed on August 13, 2021. Please use a personal access token instead."

"Support for password authentication was removed on August 13, 2021. Please use a personal access token instead."

4
Comments 1
1 min read
Do not expose database ids in your URLs

Do not expose database ids in your URLs

61
Comments 5
3 min read
Setting session time in and out for a safe PHP login script.

Setting session time in and out for a safe PHP login script.

6
Comments
13 min read
Get safe and remain productive with can-i-ignore-scripts

Get safe and remain productive with can-i-ignore-scripts

16
Comments
2 min read
The Rebirth of the New Zealand Privacy Act

The Rebirth of the New Zealand Privacy Act

2
Comments
3 min read
Considerations in Building Enclaves for Multiparty Computation (Part 1)

Considerations in Building Enclaves for Multiparty Computation (Part 1)

3
Comments
4 min read
Authentication vulnerabilities

Authentication vulnerabilities

90
Comments 4
7 min read
Build Your Own Lint Rules for Terraform with Shisho

Build Your Own Lint Rules for Terraform with Shisho

24
Comments 1
5 min read
Create TLS / SSL Certificates for Local Development

Create TLS / SSL Certificates for Local Development

12
Comments 1
2 min read
Reversing Keyboard Driver: Part 1 (Introduction)

Reversing Keyboard Driver: Part 1 (Introduction)

16
Comments 2
2 min read
How to handle your JWT in your applications ?

How to handle your JWT in your applications ?

114
Comments 5
6 min read
Restricting Access in LitmusChaos

Restricting Access in LitmusChaos

16
Comments
3 min read
Content Security Policy violation inconsistencies across browsers

Content Security Policy violation inconsistencies across browsers

3
Comments
2 min read
How HttpOnly cookies help mitigate XSS attacks 🍪

How HttpOnly cookies help mitigate XSS attacks 🍪

34
Comments 1
3 min read
The 7 assumptions about strings you probably have

The 7 assumptions about strings you probably have

16
Comments 3
10 min read
loading...