DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Web Cache Poisoning

Web Cache Poisoning

4
Comments
1 min read
How a Rogue Developer Ruined Millions of Software (happened this weekend)

How a Rogue Developer Ruined Millions of Software (happened this weekend)

68
Comments 26
3 min read
Hack Solidity: Block Timestamp Manipulation

Hack Solidity: Block Timestamp Manipulation

7
Comments 1
2 min read
8 ways to become a BETTER SRE ( Right now! ) | 8 non-technical characteristics to have

8 ways to become a BETTER SRE ( Right now! ) | 8 non-technical characteristics to have

9
Comments
5 min read
Inside Adyen: The Log4j Saga

Inside Adyen: The Log4j Saga

5
Comments
5 min read
How to use AWS SSM Session Manager Plugin

How to use AWS SSM Session Manager Plugin

10
Comments
2 min read
.NET: Modelo Criptográfico, lo que necesitas saber.

.NET: Modelo Criptográfico, lo que necesitas saber.

13
Comments
10 min read
Envify - Your Secret Vault in Flutter

Envify - Your Secret Vault in Flutter

2
Comments
1 min read
Hack Solidity: Self Destruct

Hack Solidity: Self Destruct

12
Comments 2
2 min read
Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 2/2)

Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 2/2)

5
Comments
3 min read
How to set up Session Manager and enable SSH over SSM

How to set up Session Manager and enable SSH over SSM

49
Comments 2
3 min read
Things You Need To Know About Website Pen-Testing: A Checklist

Things You Need To Know About Website Pen-Testing: A Checklist

2
Comments
4 min read
Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 1/2)

Automatically scan your Project Dependencies for Vulnerabilities using Docker, Jenkins, ... (Part 1/2)

5
Comments
2 min read
Integer Overflow and Underflow in Solidity

Integer Overflow and Underflow in Solidity

5
Comments
2 min read
DevSecOps and Shift Left Security: A Guide

DevSecOps and Shift Left Security: A Guide

8
Comments 2
9 min read
Security Puzzle (Log4J Edition)

Security Puzzle (Log4J Edition)

6
Comments
2 min read
Detect Marak Squires packages with NodeSecure

Detect Marak Squires packages with NodeSecure

9
Comments 1
1 min read
Setting up iDRAC 6 with Let's Encrypt SSL Certificates

Setting up iDRAC 6 with Let's Encrypt SSL Certificates

4
Comments
1 min read
Reentrancy Attack in Solidity Smart Contract

Reentrancy Attack in Solidity Smart Contract

14
Comments
3 min read
How prepared statement prevent SQL Injection ?

How prepared statement prevent SQL Injection ?

5
Comments
1 min read
Design Web API endpoint without leaking data to monitoring service

Design Web API endpoint without leaking data to monitoring service

6
Comments
2 min read
Simple way to do device fingerprinting

Simple way to do device fingerprinting

6
Comments
1 min read
Tracking and Notifying on AWS Sign-in activities

Tracking and Notifying on AWS Sign-in activities

3
Comments 2
4 min read
Hack The Box Writeup: Previse - SSHad0w

Hack The Box Writeup: Previse - SSHad0w

4
Comments
15 min read
Desplegando servidor SFTP en AWS

Desplegando servidor SFTP en AWS

7
Comments
8 min read
Different types of VPS hosting

Different types of VPS hosting

2
Comments 1
3 min read
log4j Hub - Everything related to log4j-CVE-2021-44228.

log4j Hub - Everything related to log4j-CVE-2021-44228.

5
Comments
4 min read
Please remove that .DS_Store

Please remove that .DS_Store

99
Comments 18
2 min read
target="_blank" is a security risk?

target="_blank" is a security risk?

162
Comments 19
1 min read
What is SSH and why should you use it?

What is SSH and why should you use it?

8
Comments
5 min read
"IAM is HARD"

"IAM is HARD"

9
Comments
7 min read
AzureFunBytes Episode 64 - Building SOC Efficiency with @Azure Sentinel with @rodtrent

AzureFunBytes Episode 64 - Building SOC Efficiency with @Azure Sentinel with @rodtrent

5
Comments
4 min read
Kubernetes Hardening Tutorial Part 1: Pods

Kubernetes Hardening Tutorial Part 1: Pods

32
Comments 2
8 min read
Why NOT TO Ship NodeJS Containers With NPM?

Why NOT TO Ship NodeJS Containers With NPM?

6
Comments
2 min read
Migrating Helmet for Express.js from v4.x to v5.x

Migrating Helmet for Express.js from v4.x to v5.x

7
Comments
2 min read
Why is redux state immutable?

Why is redux state immutable?

6
Comments
4 min read
Use Keyring for Sign-in Across Different Apps and Platforms

Use Keyring for Sign-in Across Different Apps and Platforms

4
Comments
6 min read
AzureFunBytes Reminder - Building SOC Efficiency with @Azure Sentinel with @rodtrent - 1/6/2022

AzureFunBytes Reminder - Building SOC Efficiency with @Azure Sentinel with @rodtrent - 1/6/2022

3
Comments
4 min read
Writing Policies Around Multiple Roles with Ruby on Rails

Writing Policies Around Multiple Roles with Ruby on Rails

6
Comments
4 min read
Java JSON deserialization problems with the Jackson ObjectMapper

Java JSON deserialization problems with the Jackson ObjectMapper

5
Comments
5 min read
Checking Vulnerabilities in Termux Android Application Using MobSF

Checking Vulnerabilities in Termux Android Application Using MobSF

7
Comments
8 min read
How to Secure your NodeJs Express JavaScript Application - part 1

How to Secure your NodeJs Express JavaScript Application - part 1

25
Comments 2
4 min read
GraphQL RBAC without JWT Roles

GraphQL RBAC without JWT Roles

12
Comments 5
7 min read
Hashicorp Vault | Dev and Prod server setup | Unseal | Policies | TLS setup | Tharun

Hashicorp Vault | Dev and Prod server setup | Unseal | Policies | TLS setup | Tharun

22
Comments
5 min read
Hashicorp Vault | What & Why? | All you need to know about Vault | Secrets management for roadrunners

Hashicorp Vault | What & Why? | All you need to know about Vault | Secrets management for roadrunners

10
Comments
4 min read
Web-Security for Developers: Cross-Site Scripting (XSS)

Web-Security for Developers: Cross-Site Scripting (XSS)

12
Comments
3 min read
Critical Security Areas That Software Engineers Have To Know To Secure Their Solutions

Critical Security Areas That Software Engineers Have To Know To Secure Their Solutions

7
Comments
10 min read
web3 does a lot more than you've been told

web3 does a lot more than you've been told

9
Comments 3
7 min read
Need A Simple and Powerful Password Manager? Try this!

Need A Simple and Powerful Password Manager? Try this!

6
Comments 2
1 min read
Log4Shell - Explorando um servidor Java vulnerável

Log4Shell - Explorando um servidor Java vulnerável

6
Comments
5 min read
Phishing Campaigns And YouTube Creators

Phishing Campaigns And YouTube Creators

11
Comments 1
1 min read
Vulnerability exploit : Access to the private state variable in a Smart Contract

Vulnerability exploit : Access to the private state variable in a Smart Contract

10
Comments 2
9 min read
Practical Security Checklist for the WFH Network

Practical Security Checklist for the WFH Network

4
Comments
3 min read
Quick, Easy, & Free* Tools to up your Security Game

Quick, Easy, & Free* Tools to up your Security Game

11
Comments
2 min read
Securely Access Your AWS Resources From Github Actions

Securely Access Your AWS Resources From Github Actions

41
Comments 4
6 min read
JWT explained as Formulas

JWT explained as Formulas

45
Comments 3
2 min read
A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483)

A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483)

3
Comments
1 min read
Log4j 2.17.0 に関わる新たな RCE 脆弱性 (CVE-2021-4483)

Log4j 2.17.0 に関わる新たな RCE 脆弱性 (CVE-2021-4483)

3
Comments
1 min read
Automate scanning for vulnerabilities, network exposures & deviation from best practices in AWS

Automate scanning for vulnerabilities, network exposures & deviation from best practices in AWS

9
Comments
7 min read
Secure Web Applications Using Sub Resource Integrity

Secure Web Applications Using Sub Resource Integrity

4
Comments
2 min read
loading...