DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 25th September 2020

Security news weekly round-up - 25th September 2020

3
Comments
3 min read
A (secret) way to bypass Chrome's security/privacy error

A (secret) way to bypass Chrome's security/privacy error

9
Comments 1
1 min read
Vaccines for Common SQL Injection Bugs

Vaccines for Common SQL Injection Bugs

4
Comments
2 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

5
Comments 2
1 min read
How to monitorize program execution on Windows using Wazuh and sysmon.

How to monitorize program execution on Windows using Wazuh and sysmon.

5
Comments
3 min read
3 sets of Cybersecurity challenges & answers (CTF) to learn from

3 sets of Cybersecurity challenges & answers (CTF) to learn from

26
Comments
2 min read
Securing our Serverless Apps on Azure

Securing our Serverless Apps on Azure

3
Comments
1 min read
Why Do Certificate Revocation Checking Mechanisms Never Work?

Why Do Certificate Revocation Checking Mechanisms Never Work?

2
Comments
18 min read
On .NET Episode: Securing Services with MSAL

On .NET Episode: Securing Services with MSAL

11
Comments
1 min read
A Field Guide to CoAP, Part 1

A Field Guide to CoAP, Part 1

4
Comments
8 min read
How to Integrate Security Into a DevOps Cycle

How to Integrate Security Into a DevOps Cycle

13
Comments
5 min read
Are you worried about Security at the Application Layer?

Are you worried about Security at the Application Layer?

9
Comments
4 min read
Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
How create a discipline routine for learn development!

How create a discipline routine for learn development!

3
Comments 1
1 min read
A Practical Guide to AWS IAM

A Practical Guide to AWS IAM

3
Comments 2
1 min read
Secure SDLC and Best Practices for Outsourcing

Secure SDLC and Best Practices for Outsourcing

7
Comments
6 min read
CodeQL Analysis on GitHub

CodeQL Analysis on GitHub

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
Generating a Self Signed Certificate using Powershell

Generating a Self Signed Certificate using Powershell

9
Comments
1 min read
SPFx issues with the new Referrer-Policy in Chrome >= 85

SPFx issues with the new Referrer-Policy in Chrome >= 85

3
Comments
2 min read
All you need to know about TERMUX

All you need to know about TERMUX

24
Comments
2 min read
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

6
Comments 1
2 min read
How to Securely Access The Dark Web in 15 Steps. Second Part

How to Securely Access The Dark Web in 15 Steps. Second Part

8
Comments
9 min read
OAuth 2.0 Resources You Can Actually Understand

OAuth 2.0 Resources You Can Actually Understand

147
Comments 3
3 min read
Scilla, information-gathering tool!

Scilla, information-gathering tool!

3
Comments 1
1 min read
Best Practices for Securing Your REST APIs

Best Practices for Securing Your REST APIs

102
Comments 3
4 min read
5 tips to secure your backend application

5 tips to secure your backend application

7
Comments
3 min read
How to make your MongoDB container more secure?

How to make your MongoDB container more secure?

63
Comments 2
3 min read
How to Prevent Data Loss: 13 Simple Ways

How to Prevent Data Loss: 13 Simple Ways

37
Comments
7 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
CyberSecurity acronyms cheat sheet and dictionary

CyberSecurity acronyms cheat sheet and dictionary

23
Comments
4 min read
Security Matters!! ( SSL )

Security Matters!! ( SSL )

7
Comments
2 min read
ZOOMing in on CISO, Jason Lee

ZOOMing in on CISO, Jason Lee

6
Comments 1
3 min read
Encryption as a Service in Action

Encryption as a Service in Action

9
Comments
5 min read
Abusing the Type System

Abusing the Type System

4
Comments
6 min read
10 Best Practices for Application Security in the Cloud

10 Best Practices for Application Security in the Cloud

7
Comments 1
7 min read
5 server security tips for beginners

5 server security tips for beginners

5
Comments
6 min read
Security best practices on AWS

Security best practices on AWS

23
Comments 2
3 min read
Aerospike Security Events and Audit Logs

Aerospike Security Events and Audit Logs

5
Comments
3 min read
Aerospike Authentication and Authorization

Aerospike Authentication and Authorization

4
Comments
5 min read
Aerospike Data Protection

Aerospike Data Protection

4
Comments
5 min read
Aerospike Network Security

Aerospike Network Security

4
Comments
7 min read
Another Reason to Avoid Constantize in Rails

Another Reason to Avoid Constantize in Rails

7
Comments
5 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
In Which Sarah Learns Web Security: Part Two, Input and Output

In Which Sarah Learns Web Security: Part Two, Input and Output

5
Comments
6 min read
Cracking Spotify Codes and making a quest out of it

Cracking Spotify Codes and making a quest out of it

8
Comments 1
5 min read
Automating deploying Vault, a password manager for your code, with Terraform

Automating deploying Vault, a password manager for your code, with Terraform

10
Comments
9 min read
Running a Graphical Application from a Docker Container - Simply and Securely

Running a Graphical Application from a Docker Container - Simply and Securely

7
Comments
16 min read
Why Firestore Encourages Bad Security

Why Firestore Encourages Bad Security

39
Comments 16
7 min read
Set up your own VPN with OpenVPN and DigitalOcean

Set up your own VPN with OpenVPN and DigitalOcean

8
Comments 1
3 min read
Use mitmproxy as a personal firewall

Use mitmproxy as a personal firewall

8
Comments 2
3 min read
What is a DDoS attack anyway?

What is a DDoS attack anyway?

10
Comments
5 min read
NodeSecure v0.7.0 and v0.8.0@next

NodeSecure v0.7.0 and v0.8.0@next

6
Comments
3 min read
Using your Yubikey to store your SSH Key (RSA 4096)

Using your Yubikey to store your SSH Key (RSA 4096)

27
Comments 1
4 min read
Security news weekly round-up - 11th September 2020

Security news weekly round-up - 11th September 2020

3
Comments
3 min read
Serving private content from S3 using CloudFront

Serving private content from S3 using CloudFront

3
Comments
7 min read
Using your Yubikey for Signed Git Commits

Using your Yubikey for Signed Git Commits

18
Comments 4
3 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
Offline Digital Identity without Internet and Digital ID for Refugees

Offline Digital Identity without Internet and Digital ID for Refugees

6
Comments
4 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
loading...