DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security tips for Djangonauts

Security tips for Djangonauts

35
Comments 1
3 min read
What To Do With VPN? 20 Ways To Use Your VPN

What To Do With VPN? 20 Ways To Use Your VPN

10
Comments 4
7 min read
How to protect Serverless (Open)API's?

How to protect Serverless (Open)API's?

95
Comments 2
19 min read
Kubernetes: part 5 — RBAC authorization with a Role and RoleBinding example

Kubernetes: part 5 — RBAC authorization with a Role and RoleBinding example

11
Comments 1
8 min read
Migrating From Authy to Bitwarden for 2FA Codes

Migrating From Authy to Bitwarden for 2FA Codes

6
Comments
8 min read
The most basic security for Spring Boot with Thymeleaf

The most basic security for Spring Boot with Thymeleaf

19
Comments 4
2 min read
First Streaming Ever - Git Security

First Streaming Ever - Git Security

7
Comments
1 min read
Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer

Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer

7
Comments
2 min read
The 10 most critical API security risks - Part 9: Improper Assets Management

The 10 most critical API security risks - Part 9: Improper Assets Management

7
Comments
2 min read
Blocking Disposable Emails

Blocking Disposable Emails

6
Comments 2
5 min read
Secure by Design

Secure by Design

11
Comments 1
6 min read
Java - secure an endpoint using Spring Security

Java - secure an endpoint using Spring Security

10
Comments
12 min read
Inspecting Web Traffic with Burp Suite Proxy

Inspecting Web Traffic with Burp Suite Proxy

9
Comments
7 min read
Investigation into Postgres malware (hack?)

Investigation into Postgres malware (hack?)

49
Comments 15
6 min read
SSO: OAuth 2.0 vs. OpenID Connect vs. SAML

SSO: OAuth 2.0 vs. OpenID Connect vs. SAML

16
Comments
2 min read
The right way of accessing Azure services from inside your Azure Kubernetes Cluster

The right way of accessing Azure services from inside your Azure Kubernetes Cluster

8
Comments
6 min read
Testing Laravel API endpoints with jwt-auth

Testing Laravel API endpoints with jwt-auth

23
Comments
3 min read
Fixing security vulnerabilities in npm dependencies in less than 3 mins

Fixing security vulnerabilities in npm dependencies in less than 3 mins

18
Comments 5
3 min read
Simplify AWS IAM Role Trust Policies in Organizations

Simplify AWS IAM Role Trust Policies in Organizations

8
Comments
2 min read
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

7
Comments
5 min read
How to make server access sharing easy and secure ?

How to make server access sharing easy and secure ?

7
Comments
2 min read
Handling JWT securely on your client

Handling JWT securely on your client

7
Comments
1 min read
Hacker101 CTF - H1 Thermostat

Hacker101 CTF - H1 Thermostat

11
Comments 4
4 min read
How to get the verified flag on your commits in GitHub

How to get the verified flag on your commits in GitHub

7
Comments
5 min read
Spring Boot: Auto Configuration and Projects

Spring Boot: Auto Configuration and Projects

11
Comments
4 min read
Unified Permissions Model

Unified Permissions Model

9
Comments
2 min read
Are security fixes safe to automate?

Are security fixes safe to automate?

6
Comments 1
1 min read
Attacks in times of fear

Attacks in times of fear

38
Comments
2 min read
The 10 most critical API security risks - Part 8: Injection

The 10 most critical API security risks - Part 8: Injection

17
Comments 1
2 min read
Github bot @dependabot fixes security vulnerabilities

Github bot @dependabot fixes security vulnerabilities

18
Comments 7
2 min read
Don't Let the Hackers Get onto your Files, either Personal or Professional.

Don't Let the Hackers Get onto your Files, either Personal or Professional.

13
Comments
5 min read
Outsourcing security with 1Password, Authy, and Privacy.com

Outsourcing security with 1Password, Authy, and Privacy.com

50
Comments 5
5 min read
Facelock Authentication for Linux

Facelock Authentication for Linux

10
Comments 2
1 min read
I know what you did.

I know what you did.

23
Comments 1
2 min read
Keybase overview 🔐

Keybase overview 🔐

6
Comments
3 min read
Why Include Browser Updates As Part Of Your Dev Cycle?

Why Include Browser Updates As Part Of Your Dev Cycle?

3
Comments
2 min read
Hacker101 CTF - Petshop Pro

Hacker101 CTF - Petshop Pro

25
Comments 12
5 min read
Kali Linux Inside Docker

Kali Linux Inside Docker

25
Comments 2
1 min read
OverTheWire Bandit Level 8 Level 9 walk-through

OverTheWire Bandit Level 8 Level 9 walk-through

4
Comments
2 min read
Hacker101 CTF - BugDB v1

Hacker101 CTF - BugDB v1

14
Comments
2 min read
Hacker101 CTF - BugDB v3

Hacker101 CTF - BugDB v3

11
Comments
3 min read
Hacker101 CTF - BugDB v2

Hacker101 CTF - BugDB v2

8
Comments 1
2 min read
Week 0: Security blog posts introduction

Week 0: Security blog posts introduction

16
Comments
2 min read
Getting Started With Burp Suite

Getting Started With Burp Suite

20
Comments
5 min read
Cryptography - to the point

Cryptography - to the point

4
Comments
1 min read
Help! Hackers are mining my cloud for Bitcoin 😱

Help! Hackers are mining my cloud for Bitcoin 😱

62
Comments 8
3 min read
Oath: Don't Loose Your Keys!

Oath: Don't Loose Your Keys!

13
Comments
3 min read
Identifying Deprecated Go Modules with Gocheckit

Identifying Deprecated Go Modules with Gocheckit

7
Comments
1 min read
HARDENING A VANILLA WORDPRESS INSTALLATION

HARDENING A VANILLA WORDPRESS INSTALLATION

10
Comments
2 min read
npm audit vs auditjs

npm audit vs auditjs

17
Comments
6 min read
Types of Security Assessments and Which One is Right for Your Organization

Types of Security Assessments and Which One is Right for Your Organization

10
Comments
5 min read
Top 10 WordPress Security Hacks To Keep Your Website Safe

Top 10 WordPress Security Hacks To Keep Your Website Safe

16
Comments
7 min read
Securing Your GitHub Account

Securing Your GitHub Account

12
Comments
7 min read
OverTheWire Bandit Level 7 Level 8 walk-through

OverTheWire Bandit Level 7 Level 8 walk-through

11
Comments
1 min read
What is your email platform ?

What is your email platform ?

12
Comments 12
1 min read
Whelp, they got all our data, now what? - A guide, well a lecture first, then a guide.

Whelp, they got all our data, now what? - A guide, well a lecture first, then a guide.

49
Comments
18 min read
Building Secure REST API Services with Python

Building Secure REST API Services with Python

18
Comments 2
4 min read
0x00SEC CTF - Exercise #3

0x00SEC CTF - Exercise #3

13
Comments
2 min read
Perimeter Security notes

Perimeter Security notes

4
Comments
3 min read
Nevertheless, Paula Coded

Nevertheless, Paula Coded

19
Comments
2 min read
loading...