DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How serverless helps keep your WordPress site secure

How serverless helps keep your WordPress site secure

1
Comments
6 min read
My "hacking" bookmarks / tools

My "hacking" bookmarks / tools

11
Comments
5 min read
Linux Capabilities Use Cases - systemd

Linux Capabilities Use Cases - systemd

3
Comments
6 min read
Five Common Cloud Security Threats and Data Breaches

Five Common Cloud Security Threats and Data Breaches

21
Comments 4
8 min read
Spring Security Architecture fundamentals

Spring Security Architecture fundamentals

3
Comments 2
4 min read
Sigstore: A Solution to Software Supply Chain Security

Sigstore: A Solution to Software Supply Chain Security

10
Comments
6 min read
Securely connecting to third party AWS accounts using cross account roles

Securely connecting to third party AWS accounts using cross account roles

11
Comments
5 min read
Balancing Clarity, Elegance, and Risk in Regular Expressions

Balancing Clarity, Elegance, and Risk in Regular Expressions

2
Comments
17 min read
Creating Image Hash Collisions

Creating Image Hash Collisions

5
Comments
5 min read
The Easiest Way to Enable Tls 1.2 and Disable Cipher suits without troubles

The Easiest Way to Enable Tls 1.2 and Disable Cipher suits without troubles

1
Comments
3 min read
Git: scanning repositories for secrets using Gitleaks

Git: scanning repositories for secrets using Gitleaks

8
Comments
11 min read
Linux Capabilities Set and Bits

Linux Capabilities Set and Bits

9
Comments
4 min read
Why we need multiple or various code analysis tools?

Why we need multiple or various code analysis tools?

8
Comments
3 min read
What is Apple thinking?

What is Apple thinking?

62
Comments 52
1 min read
IAM: What happens when you assume a role?

IAM: What happens when you assume a role?

34
Comments
6 min read
Using Environment Variables

Using Environment Variables

3
Comments
2 min read
Build End-to-End Encryption in 51 lines of Rust

Build End-to-End Encryption in 51 lines of Rust

43
Comments 2
8 min read
Using Serverless to Scan Files with a ClamAV Lambda Layer

Using Serverless to Scan Files with a ClamAV Lambda Layer

11
Comments 11
6 min read
44 - AKS, AGIC and Kubenet - Tips and tricks to make it work

44 - AKS, AGIC and Kubenet - Tips and tricks to make it work

3
Comments
1 min read
Developing secure systems (Part 1): Why it matters

Developing secure systems (Part 1): Why it matters

8
Comments 5
9 min read
Developing secure systems (Part 2): Protecting data & passwords

Developing secure systems (Part 2): Protecting data & passwords

3
Comments
11 min read
Linux Capabilities Overview

Linux Capabilities Overview

9
Comments
2 min read
There are better options for a privacy-respecting phone

There are better options for a privacy-respecting phone

15
Comments 3
7 min read
Bootstrap Security in Kubernetes Deployments

Bootstrap Security in Kubernetes Deployments

3
Comments
13 min read
Understanding Subresource Integrity (SRI)

Understanding Subresource Integrity (SRI)

6
Comments 1
6 min read
Dealing with Environment Variables in Flask

Dealing with Environment Variables in Flask

32
Comments 6
7 min read
How to Create Secret Tokens in Python

How to Create Secret Tokens in Python

3
Comments
2 min read
Attacks on privacy. Why do we need PETs?

Attacks on privacy. Why do we need PETs?

5
Comments 1
7 min read
TryHackMe Super-Spam Walkthrough

TryHackMe Super-Spam Walkthrough

6
Comments
14 min read
AWS Config -An intro

AWS Config -An intro

7
Comments 1
2 min read
Why Secrets Management Is NOT Just a Key-Value Store

Why Secrets Management Is NOT Just a Key-Value Store

2
Comments
7 min read
Automated Vulnerability Prioritization in the Context of the Cloud

Automated Vulnerability Prioritization in the Context of the Cloud

12
Comments
5 min read
CockroachDB - simulating RBAC

CockroachDB - simulating RBAC

6
Comments 1
3 min read
Azure DevOps: Terraform variables with Azure Key Vault

Azure DevOps: Terraform variables with Azure Key Vault

17
Comments
3 min read
Save your Passwords | A Django Project

Save your Passwords | A Django Project

6
Comments
6 min read
Why you should start your wargames journey?

Why you should start your wargames journey?

2
Comments
2 min read
Export database snapshots manually to S3 & export S3 content in Glue Data Catalog using Crawler for tables fetched in Athena

Export database snapshots manually to S3 & export S3 content in Glue Data Catalog using Crawler for tables fetched in Athena

14
Comments 3
11 min read
Security news weekly round-up - 6th August 2021

Security news weekly round-up - 6th August 2021

2
Comments
3 min read
Cómo mejorar la seguridad de tu API

Cómo mejorar la seguridad de tu API

6
Comments 1
5 min read
What is YAML File?

What is YAML File?

5
Comments
1 min read
TryHackMe CMSpit Room Walkthrough

TryHackMe CMSpit Room Walkthrough

7
Comments
8 min read
How to prevent a potential remote code execution via SnakeYAML deserialization

How to prevent a potential remote code execution via SnakeYAML deserialization

4
Comments
1 min read
How I (unintentionally) became a hacker

How I (unintentionally) became a hacker

38
Comments 3
3 min read
Linux Cheat Sheet For Beginners

Linux Cheat Sheet For Beginners

22
Comments 4
9 min read
Windows Security Alert: Disable Print Spooler

Windows Security Alert: Disable Print Spooler

5
Comments
1 min read
Mobile Security Tips and Best Practices 📱

Mobile Security Tips and Best Practices 📱

8
Comments
4 min read
Kubernetes Hardening Guidance

Kubernetes Hardening Guidance

2
Comments 1
1 min read
How To Hide Your .env While You're Livestreaming

How To Hide Your .env While You're Livestreaming

31
Comments 2
1 min read
Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

Cross-site Request Forgery Attacks (CSRF): What a frontend developer should know

44
Comments
8 min read
Keeping things safe, using React Router !

Keeping things safe, using React Router !

7
Comments
2 min read
How to write an effective cloud security guideline

How to write an effective cloud security guideline

6
Comments
4 min read
Mobile Security Framework (MobSF) for automated Mobile security testing

Mobile Security Framework (MobSF) for automated Mobile security testing

12
Comments
2 min read
OpenBSD httpd: Basic authentication with htpasswd

OpenBSD httpd: Basic authentication with htpasswd

6
Comments
1 min read
Security news weekly round-up - 30th July 2021

Security news weekly round-up - 30th July 2021

2
Comments
4 min read
Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

4
Comments
3 min read
Protect Your SignalR Service Based Real-time Application with Application Gateway

Protect Your SignalR Service Based Real-time Application with Application Gateway

18
Comments 10
6 min read
Openssl by Example

Openssl by Example

5
Comments
1 min read
Cross-site scripting (XSS) attack - part 3

Cross-site scripting (XSS) attack - part 3

8
Comments
4 min read
Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

14
Comments
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
loading...