DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Return to the Land of Environment Variables

Return to the Land of Environment Variables

5
Comments 1
3 min read
Configure HTTP Security headers with CloudFront Functions

Configure HTTP Security headers with CloudFront Functions

13
Comments 2
5 min read
Fuck up story; rotate committed secret(s) on multiple Heroku apps

Fuck up story; rotate committed secret(s) on multiple Heroku apps

4
Comments
6 min read
Self-signed certificates: shell script to generate

Self-signed certificates: shell script to generate

4
Comments
4 min read
Como começar em segurança da informação?

Como começar em segurança da informação?

27
Comments
4 min read
Secure Web App access with GCP Identity-Aware Proxy

Secure Web App access with GCP Identity-Aware Proxy

9
Comments
5 min read
Shift Left on Security: EXPLAINED Easily

Shift Left on Security: EXPLAINED Easily

9
Comments 3
4 min read
Ծրագրային անվտանգություն՝ SQL Injection (մաս 1)

Ծրագրային անվտանգություն՝ SQL Injection (մաս 1)

3
Comments
1 min read
Deciding on Auth models

Deciding on Auth models

3
Comments
3 min read
The Case of the Missing Szechuan Sauce: investigation notes

The Case of the Missing Szechuan Sauce: investigation notes

2
Comments
10 min read
Smartphone, a Spy in your Pocket

Smartphone, a Spy in your Pocket

2
Comments 1
1 min read
AzureFunBytes Reminder - @Azure Data Factory Security with @narainabhishek - 5/20/2021

AzureFunBytes Reminder - @Azure Data Factory Security with @narainabhishek - 5/20/2021

4
Comments
3 min read
What are the Ways to Prevent an Organization from Phishing Attacks?

What are the Ways to Prevent an Organization from Phishing Attacks?

3
Comments
5 min read
Deadshot: Keep Sensitive Data Out of Code

Deadshot: Keep Sensitive Data Out of Code

8
Comments
2 min read
Automate ZAP With Docker

Automate ZAP With Docker

6
Comments
8 min read
Common DevSecOps Challenges and How to Overcome Them

Common DevSecOps Challenges and How to Overcome Them

10
Comments
6 min read
SECURE Your Code From the Start with Snyk.io and Snyk Code

SECURE Your Code From the Start with Snyk.io and Snyk Code

8
Comments
4 min read
How to Protect Cookies Against Common XSS Attacks on the Web?

How to Protect Cookies Against Common XSS Attacks on the Web?

12
Comments
1 min read
Getting started with Next.js + Strapi: Security first

Getting started with Next.js + Strapi: Security first

27
Comments 2
10 min read
5 developer tools for detecting and fixing security vulnerabilities

5 developer tools for detecting and fixing security vulnerabilities

182
Comments 12
6 min read
API Testing basado en OWASP

API Testing basado en OWASP

4
Comments
4 min read
PrivacyRaven: Comprehensive Privacy Testing for Deep Learning

PrivacyRaven: Comprehensive Privacy Testing for Deep Learning

3
Comments
4 min read
ArgoCD: Okta integration, and user groups

ArgoCD: Okta integration, and user groups

4
Comments
5 min read
Mitigation of SSRF Vulnerabilities

Mitigation of SSRF Vulnerabilities

6
Comments
5 min read
Physical Security

Physical Security

2
Comments
3 min read
Authorization mechanisms in Rust web applications

Authorization mechanisms in Rust web applications

28
Comments
8 min read
DevSecOps -Automate & Secure

DevSecOps -Automate & Secure

20
Comments
8 min read
Angular forms - NEVER rely on a disabled "submit" button!

Angular forms - NEVER rely on a disabled "submit" button!

5
Comments 8
1 min read
Shifting Left of Bang to Improve Your DevOps Security

Shifting Left of Bang to Improve Your DevOps Security

2
Comments
7 min read
An insight into security research and ethical hacking

An insight into security research and ethical hacking

8
Comments
12 min read
Reverse engineering binaries using gdb

Reverse engineering binaries using gdb

7
Comments
6 min read
Hacking wireless access points

Hacking wireless access points

5
Comments
5 min read
JWT should not be your default for sessions

JWT should not be your default for sessions

6
Comments 2
7 min read
Using Auth0 With Static Web Apps

Using Auth0 With Static Web Apps

40
Comments
5 min read
Using Okta With Static Web Apps

Using Okta With Static Web Apps

21
Comments
5 min read
✅ 5 simple security tips for your .NET applications

✅ 5 simple security tips for your .NET applications

29
Comments 3
4 min read
Pod Health with Liveness Probes

Pod Health with Liveness Probes

11
Comments
3 min read
How to Secure Your Firebase Project

How to Secure Your Firebase Project

4
Comments
3 min read
The movie app that watches you watching

The movie app that watches you watching

9
Comments 2
5 min read
Broken Authentication: Methodology & Prevention

Broken Authentication: Methodology & Prevention

4
Comments 2
3 min read
Backstage: cryptographic R&D internship at Cossack Labs

Backstage: cryptographic R&D internship at Cossack Labs

12
Comments
5 min read
How to encrypt/decrypt XML element inside a XML document

How to encrypt/decrypt XML element inside a XML document

11
Comments
3 min read
Decode TOTP(Time-based One-time Password) QR Code

Decode TOTP(Time-based One-time Password) QR Code

6
Comments 1
2 min read
TryHackMe Blue

TryHackMe Blue

5
Comments
12 min read
XSS Attacks Types on Web

XSS Attacks Types on Web

12
Comments
1 min read
Why did my Java Web App stop working with MySQL!?!

Why did my Java Web App stop working with MySQL!?!

6
Comments 4
3 min read
Symmetric v/s Asymmetric Encryption

Symmetric v/s Asymmetric Encryption

6
Comments
2 min read
Regular Expression Vulnerability

Regular Expression Vulnerability

3
Comments
5 min read
Static Code Analyses - Terrascan, Terraform and Azure DevOps

Static Code Analyses - Terrascan, Terraform and Azure DevOps

7
Comments
5 min read
An abridged guide to using ed25519 PGP keys with GnuPG and SSH

An abridged guide to using ed25519 PGP keys with GnuPG and SSH

2
Comments
4 min read
Implementing Passwordless Authentication in Node.JS

Implementing Passwordless Authentication in Node.JS

769
Comments 38
6 min read
Access Key Vault secret from Web Application

Access Key Vault secret from Web Application

6
Comments
4 min read
Understand and use Azure Key Vault Easily (Most Secured Secrets Storage)

Understand and use Azure Key Vault Easily (Most Secured Secrets Storage)

2
Comments
3 min read
How a Yubikey works and why you should use one

How a Yubikey works and why you should use one

3
Comments
5 min read
Malicious Docker Cryptomining Images Rack Up 20M Downloads

Malicious Docker Cryptomining Images Rack Up 20M Downloads

2
Comments
1 min read
Website Security: 11 Steps to protect your Website from Attacks 🐱‍💻

Website Security: 11 Steps to protect your Website from Attacks 🐱‍💻

43
Comments 4
13 min read
WordPress: modify user roles dynamically with functions.php

WordPress: modify user roles dynamically with functions.php

3
Comments
1 min read
WordPress: modify user capabilities dynamically with functions.php

WordPress: modify user capabilities dynamically with functions.php

7
Comments
1 min read
Aggregating and Visualizing DMARC Reports

Aggregating and Visualizing DMARC Reports

8
Comments 1
5 min read
SonarCloud vs LeftShift for automated code quality and security checks

SonarCloud vs LeftShift for automated code quality and security checks

2
Comments
1 min read
loading...