DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cómo mejorar la seguridad de tu API

Cómo mejorar la seguridad de tu API

6
Comments 1
5 min read
What is YAML File?

What is YAML File?

5
Comments
1 min read
TryHackMe CMSpit Room Walkthrough

TryHackMe CMSpit Room Walkthrough

7
Comments
8 min read
How to prevent a potential remote code execution via SnakeYAML deserialization

How to prevent a potential remote code execution via SnakeYAML deserialization

4
Comments
1 min read
How I (unintentionally) became a hacker

How I (unintentionally) became a hacker

38
Comments 3
3 min read
Linux Cheat Sheet For Beginners

Linux Cheat Sheet For Beginners

22
Comments 4
9 min read
Windows Security Alert: Disable Print Spooler

Windows Security Alert: Disable Print Spooler

5
Comments
1 min read
Mobile Security Tips and Best Practices 📱

Mobile Security Tips and Best Practices 📱

8
Comments
4 min read
Kubernetes Hardening Guidance

Kubernetes Hardening Guidance

2
Comments 1
1 min read
How To Hide Your .env While You're Livestreaming

How To Hide Your .env While You're Livestreaming

31
Comments 2
1 min read
Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

44
Comments
8 min read
Keeping things safe, using React Router !

Keeping things safe, using React Router !

7
Comments
2 min read
How to write an effective cloud security guideline

How to write an effective cloud security guideline

6
Comments
4 min read
Mobile Security Framework (MobSF) for automated Mobile security testing

Mobile Security Framework (MobSF) for automated Mobile security testing

12
Comments
2 min read
OpenBSD httpd: Basic authentication with htpasswd

OpenBSD httpd: Basic authentication with htpasswd

6
Comments
1 min read
Security news weekly round-up - 30th July 2021

Security news weekly round-up - 30th July 2021

2
Comments
4 min read
Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

4
Comments
3 min read
Protect Your SignalR Service Based Real-time Application with Application Gateway

Protect Your SignalR Service Based Real-time Application with Application Gateway

18
Comments 10
6 min read
Openssl by Example

Openssl by Example

5
Comments
1 min read
Cross-site scripting (XSS) attack - part 3

Cross-site scripting (XSS) attack - part 3

8
Comments
4 min read
Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

14
Comments
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
Authenticating Event Hubs publishers with SAS Token

Authenticating Event Hubs publishers with SAS Token

6
Comments
4 min read
The 10 most in-demand roles in the Information Security domain

The 10 most in-demand roles in the Information Security domain

6
Comments
2 min read
Delete all users in an Azure AD Tenant programmatically

Delete all users in an Azure AD Tenant programmatically

8
Comments
4 min read
Delete an Azure AD B2C tenant programmatically

Delete an Azure AD B2C tenant programmatically

8
Comments
2 min read
Let's Make a Security Camera using your smartphone [2021]

Let's Make a Security Camera using your smartphone [2021]

3
Comments 1
1 min read
Who's responsible for securing software?

Who's responsible for securing software?

3
Comments
2 min read
AWS: Route53 Private Hosted Zones — hiding domains from the Internet

AWS: Route53 Private Hosted Zones — hiding domains from the Internet

2
Comments
4 min read
Stealthy Code Injection in a Running .NET Process

Stealthy Code Injection in a Running .NET Process

12
Comments
8 min read
Securing Azure SignalR +Azure App Service - Part 4

Securing Azure SignalR +Azure App Service - Part 4

3
Comments 1
2 min read
Pentesting detection on EDR

Pentesting detection on EDR

19
Comments
2 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

3
Comments
7 min read
Cross-site scripting (XSS) attack - Part 2

Cross-site scripting (XSS) attack - Part 2

27
Comments
4 min read
Landing Zones, Organizations, OUs and Multi-Account Environments

Landing Zones, Organizations, OUs and Multi-Account Environments

14
Comments 1
5 min read
Secure Open API (Swagger) calls with Azure Active Directory

Secure Open API (Swagger) calls with Azure Active Directory

17
Comments 11
3 min read
Updates for SQL Injection in Rails 6.1

Updates for SQL Injection in Rails 6.1

11
Comments
3 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Installing Krypt.co on NVIDIA Jetson Nano

Installing Krypt.co on NVIDIA Jetson Nano

3
Comments
4 min read
Verifying JWTs with JWKS in Ruby

Verifying JWTs with JWKS in Ruby

3
Comments
5 min read
How to set GitHub Actions's `permissions`?

How to set GitHub Actions's `permissions`?

10
Comments 1
2 min read
Cross-site scripting (XSS) attack - Part 1

Cross-site scripting (XSS) attack - Part 1

80
Comments
4 min read
More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

2
Comments
4 min read
On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

20
Comments 35
8 min read
Passman - a password manager for the command line

Passman - a password manager for the command line

2
Comments
1 min read
How to add a login form to any website, without a single line of code

How to add a login form to any website, without a single line of code

5
Comments
6 min read
AWS: Web Application Firewall overview, configuration, and its monitoring

AWS: Web Application Firewall overview, configuration, and its monitoring

8
Comments
16 min read
Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

14
Comments
4 min read
Managing remote servers with SSH and SFTP connections: a step-by-step guide

Managing remote servers with SSH and SFTP connections: a step-by-step guide

14
Comments
12 min read
Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

5
Comments
1 min read
IvyFinal CTF (Crypto 3) - Silly 400 - points

IvyFinal CTF (Crypto 3) - Silly 400 - points

5
Comments
2 min read
Top Information Gathering Methods Explained

Top Information Gathering Methods Explained

3
Comments
4 min read
Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

17
Comments
6 min read
Security news weekly round-up - 16th July 2021

Security news weekly round-up - 16th July 2021

2
Comments
3 min read
Istio Authentication & Authorization

Istio Authentication & Authorization

3
Comments 1
6 min read
The Limits of Automation w/ Judy Johnson

The Limits of Automation w/ Judy Johnson

8
Comments 1
1 min read
Application Layer DDoS Attacks

Application Layer DDoS Attacks

6
Comments
2 min read
Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

4
Comments
2 min read
How to verify your commits on GitHub

How to verify your commits on GitHub

71
Comments 4
4 min read
loading...