DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Django Admin Honeypot

Django Admin Honeypot

2
Comments
2 min read
Process Injection (Process Hollowing)

Process Injection (Process Hollowing)

6
Comments 1
13 min read
Top 5 Password managers for Mac

Top 5 Password managers for Mac

5
Comments 6
2 min read
Introdução ao conceito de autenticação

Introdução ao conceito de autenticação

6
Comments
5 min read
Top 6 security best practices for Angular apps

Top 6 security best practices for Angular apps

3
Comments
2 min read
Tutorial: To-Do List Generator V2: Identity and Permissions

Tutorial: To-Do List Generator V2: Identity and Permissions

5
Comments
11 min read
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

7
Comments
7 min read
How to NOT secure web payment systems

How to NOT secure web payment systems

6
Comments
5 min read
Using Kyverno To Enforce EKS Best Practices

Using Kyverno To Enforce EKS Best Practices

15
Comments
5 min read
3 Ways to Store and Read Credentials Locally in Python

3 Ways to Store and Read Credentials Locally in Python

3
Comments
4 min read
Comparing Popular Static Application Security Testing (SAST) Tools

Comparing Popular Static Application Security Testing (SAST) Tools

5
Comments 4
5 min read
Software Security Crash Course

Software Security Crash Course

27
Comments
6 min read
How to store and rotate database credentials using AWS Secret Manager

How to store and rotate database credentials using AWS Secret Manager

20
Comments 4
6 min read
React Protected Routes (Next js & CRA) simple but efficient

React Protected Routes (Next js & CRA) simple but efficient

40
Comments 7
2 min read
TryHackMe TShark

TryHackMe TShark

2
Comments
2 min read
NodeJS Basics: Fixing Dependency Security Issues

NodeJS Basics: Fixing Dependency Security Issues

3
Comments
1 min read
Multi-Region KMS Keys and its use cases

Multi-Region KMS Keys and its use cases

3
Comments 1
5 min read
How to setup 2way ssl authentication (mutual authentication) with Nginx

How to setup 2way ssl authentication (mutual authentication) with Nginx

3
Comments
6 min read
Why you need an SSH Access Manager - Part 2

Why you need an SSH Access Manager - Part 2

14
Comments
3 min read
How To Improve Web Application Security?

How To Improve Web Application Security?

7
Comments 1
4 min read
5 NPM Packages to Secure Your Node.js Backend in 5 Minutes

5 NPM Packages to Secure Your Node.js Backend in 5 Minutes

215
Comments 10
3 min read
Django: Allauth

Django: Allauth

4
Comments
2 min read
Django : ReCaptha Everywhere

Django : ReCaptha Everywhere

4
Comments
3 min read
AWS API Gateway Best Practices in-depth

AWS API Gateway Best Practices in-depth

17
Comments
4 min read
🔴 TechTalk - How to become a Secure Developer in 2021 with Liran Tal

🔴 TechTalk - How to become a Secure Developer in 2021 with Liran Tal

10
Comments 1
1 min read
AWS SCS-C01 Security Specialty Certification Recap Jun 2021

AWS SCS-C01 Security Specialty Certification Recap Jun 2021

Comments
8 min read
Django Defense Against Bot

Django Defense Against Bot

3
Comments
2 min read
Security Checklist 1

Security Checklist 1

2
Comments
6 min read
What Is SSH and How Does It Work?

What Is SSH and How Does It Work?

58
Comments 1
3 min read
Most Common Causes of Partition Loss and Data Recovery Methods to Use

Most Common Causes of Partition Loss and Data Recovery Methods to Use

2
Comments 1
8 min read
keycloak + Azure Active Directory

keycloak + Azure Active Directory

18
Comments 1
12 min read
How to implement an inline styles Content Security Policy with Angular and Nginx

How to implement an inline styles Content Security Policy with Angular and Nginx

21
Comments 8
4 min read
How to version control Cloud?

How to version control Cloud?

6
Comments 1
6 min read
CSP - Content Security Policy

CSP - Content Security Policy

36
Comments 1
3 min read
Prevent disposable email signup for your company

Prevent disposable email signup for your company

3
Comments
5 min read
Improving security of your apps' source-code in a few minutes

Improving security of your apps' source-code in a few minutes

5
Comments
4 min read
TryHackMe HTTP in Detail

TryHackMe HTTP in Detail

30
Comments
5 min read
Understanding CORS

Understanding CORS

50
Comments 3
6 min read
Configuring self-signed SSL certificates for local development

Configuring self-signed SSL certificates for local development

60
Comments 2
3 min read
AWS IAM users, groups and roles explained in an airport

AWS IAM users, groups and roles explained in an airport

10
Comments
6 min read
Security news weekly round-up - 11th June 2021

Security news weekly round-up - 11th June 2021

5
Comments
3 min read
Serving Static Files with Custom Headers using Golang

Serving Static Files with Custom Headers using Golang

7
Comments
3 min read
WordPress forgotten password localhost hack

WordPress forgotten password localhost hack

3
Comments 2
2 min read
A Practical Approach to Breaking & Pwning Kubernetes Clusters

A Practical Approach to Breaking & Pwning Kubernetes Clusters

3
Comments
5 min read
Understanding Cross-Site Request Forgery (CSRF or XSRF)

Understanding Cross-Site Request Forgery (CSRF or XSRF)

77
Comments
12 min read
WAF for ALBs

WAF for ALBs

7
Comments
2 min read
Cryptography for Absolute Beginners | Go from Zero to Cypherpunk

Cryptography for Absolute Beginners | Go from Zero to Cypherpunk

3
Comments
2 min read
How to use secure private npm registries

How to use secure private npm registries

13
Comments
2 min read
Backup and Recovery Security Standards

Backup and Recovery Security Standards

2
Comments
5 min read
How to Convert LV or MD RAID1 and 0 Into RAID5 Without Losing Data

How to Convert LV or MD RAID1 and 0 Into RAID5 Without Losing Data

7
Comments 1
7 min read
Securing a Serverless Multi-Tenancy Puppeteer Service

Securing a Serverless Multi-Tenancy Puppeteer Service

2
Comments
3 min read
Frontend, La primera barrera de seguridad de tu proyecto.

Frontend, La primera barrera de seguridad de tu proyecto.

10
Comments
4 min read
Raku malware analysis

Raku malware analysis

19
Comments
3 min read
XSS Attack - Is your Application Vulnerable? - npm packages can make you vulnerable!!!

XSS Attack - Is your Application Vulnerable? - npm packages can make you vulnerable!!!

4
Comments
1 min read
ACM PCA implementation

ACM PCA implementation

2
Comments
4 min read
How to invalidate a compromised JWT

How to invalidate a compromised JWT

4
Comments 2
4 min read
TypeORM - Prevent SQL Injection with Node.js, React and TypeScript

TypeORM - Prevent SQL Injection with Node.js, React and TypeScript

41
Comments 2
9 min read
How to never type passwords when using Git

How to never type passwords when using Git

211
Comments 7
5 min read
Encrypted Key-Value Store in Kotlin Multiplatform

Encrypted Key-Value Store in Kotlin Multiplatform

35
Comments
3 min read
Phoenix Stack Six

Phoenix Stack Six

2
Comments
6 min read
loading...