DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Bitwarden: use the most convenient 2FA while staying reasonably safe

Bitwarden: use the most convenient 2FA while staying reasonably safe

26
Comments 4
6 min read
Pentesting Android Apps Using "Frida and Objection"

Pentesting Android Apps Using "Frida and Objection"

3
Comments 1
1 min read
Network ACL vs Security Groups

Network ACL vs Security Groups

7
Comments
1 min read
How hackers steal your keys and secrets

How hackers steal your keys and secrets

434
Comments 33
11 min read
Different ways to authenticate your APIs

Different ways to authenticate your APIs

106
Comments 1
5 min read
How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

How open source solutions help the U.S. Air Force accelerate software development and modernize collaboration

5
Comments
4 min read
Port Knocking (Network Security Technique) Explained and Demoed in 5 Minutes!

Port Knocking (Network Security Technique) Explained and Demoed in 5 Minutes!

5
Comments
1 min read
Validating and Sanitizing user inputs on python projects REST api

Validating and Sanitizing user inputs on python projects REST api

15
Comments 2
2 min read
Let's stop being stupid about security

Let's stop being stupid about security

5
Comments
4 min read
How to Learn InfoSec and Hacking through Structured Levels

How to Learn InfoSec and Hacking through Structured Levels

134
Comments 3
5 min read
Temporary Private Message

Temporary Private Message

72
Comments 6
2 min read
Basic Security For Your Brand New Server

Basic Security For Your Brand New Server

8
Comments
3 min read
A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

4
Comments
5 min read
Signing and Validating JSON Web Tokens (JWT) For Everyone

Signing and Validating JSON Web Tokens (JWT) For Everyone

108
Comments 15
10 min read
What is Cyber Security

What is Cyber Security

7
Comments
2 min read
Node.js Resiliency Concepts: Recovery and Self-Healing

Node.js Resiliency Concepts: Recovery and Self-Healing

61
Comments
17 min read
Dockerfile Security Best Practices

Dockerfile Security Best Practices

8
Comments
5 min read
A visual introduction to AWS Lambda permissions

A visual introduction to AWS Lambda permissions

48
Comments 2
8 min read
Message Integrity, Authentication, and Non-Repudiation

Message Integrity, Authentication, and Non-Repudiation

6
Comments
4 min read
The Aura App & Physical ERD's: Getting Things in Order

The Aura App & Physical ERD's: Getting Things in Order

2
Comments
3 min read
Using JWT Token/Cookie based session authentication — Potential Identity Theft & Data Exploitation

Using JWT Token/Cookie based session authentication — Potential Identity Theft & Data Exploitation

2
Comments 3
2 min read
COMO CRIAR UMA SENHA SEGURA

COMO CRIAR UMA SENHA SEGURA

2
Comments
3 min read
What is a JWT token

What is a JWT token

44
Comments 4
3 min read
Generating pentest reports with Reconmap

Generating pentest reports with Reconmap

6
Comments
3 min read
To improve good security practices

To improve good security practices

7
Comments
1 min read
A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

11
Comments
2 min read
GitHub Thrilled : Code scanning is now available!

GitHub Thrilled : Code scanning is now available!

12
Comments
1 min read
Microsoft September 2020 Patch Tuesday

Microsoft September 2020 Patch Tuesday

3
Comments
2 min read
Making Sense of the SOAR Cybersecurity Product Space

Making Sense of the SOAR Cybersecurity Product Space

2
Comments
7 min read
Adding SSL to our Azure Node app

Adding SSL to our Azure Node app

11
Comments
4 min read
CLAD Model for Serverless Security

CLAD Model for Serverless Security

26
Comments
11 min read
Node Package Manager (NPM) Audit and what that means!

Node Package Manager (NPM) Audit and what that means!

3
Comments
3 min read
CrowdSec, an open-source, modernized & collaborative Fail2ban

CrowdSec, an open-source, modernized & collaborative Fail2ban

37
Comments 8
3 min read
How to hide secrets in an image using Python

How to hide secrets in an image using Python

10
Comments
3 min read
Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

12
Comments 1
6 min read
Cryptography for programmers 1: Basics

Cryptography for programmers 1: Basics

463
Comments 10
5 min read
🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

6
Comments
3 min read
Accessing Key Vault secrets from an Azure Kubernetes Cluster

Accessing Key Vault secrets from an Azure Kubernetes Cluster

7
Comments
2 min read
TLS and SNI snooping

TLS and SNI snooping

2
Comments
1 min read
Web Dev Wednesday: App Security

Web Dev Wednesday: App Security

6
Comments
1 min read
Como o PHP lida com a questão da segurança

Como o PHP lida com a questão da segurança

9
Comments
2 min read
Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

19
Comments
11 min read
Fixing vulnerabilities in Maven projects

Fixing vulnerabilities in Maven projects

11
Comments
5 min read
Como eu encontrei uma falha na plataforma EAD da Estácio.

Como eu encontrei uma falha na plataforma EAD da Estácio.

7
Comments
3 min read
Establishing and securing a remote connection to Raspberry Pi

Establishing and securing a remote connection to Raspberry Pi

30
Comments 2
10 min read
How do you store private keys?

How do you store private keys?

58
Comments 17
1 min read
Let's talk about Serverless Security – Create:Serverless

Let's talk about Serverless Security – Create:Serverless

20
Comments
3 min read
How important is privacy to you in choosing a cloud provider?

How important is privacy to you in choosing a cloud provider?

2
Comments 4
1 min read
Make your Ubuntu Server VPS more secure against unauthorized access

Make your Ubuntu Server VPS more secure against unauthorized access

23
Comments
10 min read
Cryptography for programmers 2: Blocks and Randomness

Cryptography for programmers 2: Blocks and Randomness

111
Comments 16
11 min read
How-to #1. Data encryption.

How-to #1. Data encryption.

5
Comments
4 min read
Add SSL Cert to Nginx

Add SSL Cert to Nginx

9
Comments
3 min read
Security Headers

Security Headers

8
Comments
1 min read
Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

7
Comments
6 min read
VPN Service? Not as secure as they sound

VPN Service? Not as secure as they sound

6
Comments 1
5 min read
Stricter Access Control to Google Cloud Registry

Stricter Access Control to Google Cloud Registry

4
Comments
3 min read
Essential Docker Container Security Features

Essential Docker Container Security Features

9
Comments 2
4 min read
DangerouslySetInnerHTML in React

DangerouslySetInnerHTML in React

4
Comments
3 min read
CORS & Preflight Request!

CORS & Preflight Request!

25
Comments 3
3 min read
Intro to Security as Code

Intro to Security as Code

6
Comments
8 min read
loading...