DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Proxmox Network Storage: Firewall Rules

Proxmox Network Storage: Firewall Rules

2
Comments
3 min read
Pentesting AWS Cognito: User Authentication Risks

Pentesting AWS Cognito: User Authentication Risks

Comments
12 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Protecting your Fintech App Customers further with Panic Password

Protecting your Fintech App Customers further with Panic Password

3
Comments
3 min read
How to disable root ssh login in Linux

How to disable root ssh login in Linux

Comments
1 min read
Handling JWT Authentications Securely: Pitfalls and Best Practices

Handling JWT Authentications Securely: Pitfalls and Best Practices

6
Comments
3 min read
The backbone of the internet: understanding protocol

The backbone of the internet: understanding protocol

Comments
4 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

11
Comments
3 min read
AWS Security Group Rules

AWS Security Group Rules

Comments
2 min read
LINUX Systems Under Attack via Printing System (CUPS)

LINUX Systems Under Attack via Printing System (CUPS)

4
Comments
5 min read
Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Discover Hidden Subdomains Effortlessly with SubDomainRadar.io and Python

Comments
3 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

Understanding JSON Web Tokens (JWT): The Key to Secure Authentication

4
Comments
2 min read
Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
This Month in Minder: September 2024

This Month in Minder: September 2024

3
Comments
1 min read
Easy way to geo-fence your cloud VPS with nftables

Easy way to geo-fence your cloud VPS with nftables

Comments 1
5 min read
AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

AdminForth got new plugins: RichEditor, Import-Export, AuditLog, 2FA

1
Comments 1
1 min read
Why should you upgrade your PostgreSQL today?

Why should you upgrade your PostgreSQL today?

1
Comments 1
3 min read
Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

Can AI Outsmart the Hackers? Adversarial Attacks and Defenses in Time-Series Forecasting

1
Comments 1
4 min read
3G Cell Service Has a HUGE Security Flaw.

3G Cell Service Has a HUGE Security Flaw.

21
Comments 9
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

11
Comments
1 min read
Building a Password Manager in Go: Part 2

Building a Password Manager in Go: Part 2

10
Comments 1
3 min read
Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

Securing Your Django Application: Best Practices for Preventing XSS, CSRF, and More

1
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
From legacy to cloud serverless - Part 4

From legacy to cloud serverless - Part 4

Comments
7 min read
Enhance DigitalOcean with AWS-Level SSM and SSO Features

Enhance DigitalOcean with AWS-Level SSM and SSO Features

Comments
4 min read
Network Automization using AI.

Network Automization using AI.

Comments
6 min read
HIPAA Compliance Checklist For Healthcare Startups

HIPAA Compliance Checklist For Healthcare Startups

Comments
7 min read
How to publish custom cdk-nag rules and rule packs with Projen

How to publish custom cdk-nag rules and rule packs with Projen

5
Comments
6 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

Mitigate XSS exploits when using React's `dangerously SetInnerHTML`

1
Comments
3 min read
Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

Enhancing Security with Mutual TLS (mTLS) for AWS Application Load Balancer

4
Comments
6 min read
Proxmox and NAS: Implementing VLANs for Network Isolation

Proxmox and NAS: Implementing VLANs for Network Isolation

Comments
4 min read
Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

Máquina Valley do TryHackMe e o ciclo de vida de um ciberataque

5
Comments
16 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

1
Comments
3 min read
Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

1
Comments
3 min read
Is Authentication Just About What The Server And Client Know And Don't Know?

Is Authentication Just About What The Server And Client Know And Don't Know?

Comments
2 min read
JWT at a Glance

JWT at a Glance

Comments
13 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

4
Comments
4 min read
Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

5
Comments 1
2 min read
Proteção em dispositivos móveis.

Proteção em dispositivos móveis.

Comments
2 min read
Data Validation Techniques

Data Validation Techniques

20
Comments
1 min read
Top 10 Tips with Code Examples: How to Secure Your C# Application

Top 10 Tips with Code Examples: How to Secure Your C# Application

10
Comments
3 min read
Re-rebuilding TF2.8 image: 369 patches

Re-rebuilding TF2.8 image: 369 patches

Comments
1 min read
Securing Rails application with Action Policy

Securing Rails application with Action Policy

Comments
4 min read
Security news weekly round-up - 20th September 2024

Security news weekly round-up - 20th September 2024

1
Comments
3 min read
Geolocation fun with Gemini

Geolocation fun with Gemini

2
Comments
7 min read
Secure API Key Handling in Python Projects

Secure API Key Handling in Python Projects

1
Comments
2 min read
CORS (Cross-Origin Resource Sharing) 🌐

CORS (Cross-Origin Resource Sharing) 🌐

Comments
9 min read
Flexible policy enforcement with Minder profile selectors

Flexible policy enforcement with Minder profile selectors

4
Comments
1 min read
The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

2
Comments
8 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

Comments
3 min read
Critical LLM Security Risks and Best Practices for Teams

Critical LLM Security Risks and Best Practices for Teams

38
Comments
8 min read
Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

5
Comments
5 min read
The Easiest Network Attack for Beginners: ARP Spoofing

The Easiest Network Attack for Beginners: ARP Spoofing

Comments
5 min read
AuthenticationHandler in ASPNET

AuthenticationHandler in ASPNET

11
Comments 1
3 min read
loading...