DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Announcing the tru.ID CLI

Announcing the tru.ID CLI

7
Comments
7 min read
How react-native-config make my life easier to steal secret keys of your React Native Application

How react-native-config make my life easier to steal secret keys of your React Native Application

5
Comments
1 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

6
Comments
2 min read
Explaining Authentication Security Issues through Memes!

Explaining Authentication Security Issues through Memes!

3
Comments
2 min read
Firewall for Applications in Kubernetes

Firewall for Applications in Kubernetes

3
Comments
3 min read
Secure Azure deployments with Bicep and Azure Key Vault

Secure Azure deployments with Bicep and Azure Key Vault

20
Comments
6 min read
Security in Software Development - Part 1

Security in Software Development - Part 1

2
Comments
2 min read
Content Security Policy Header: A Complete Guide

Content Security Policy Header: A Complete Guide

10
Comments
15 min read
JS-X-Ray 3.0

JS-X-Ray 3.0

8
Comments 1
2 min read
Password management on the command line

Password management on the command line

15
Comments 2
5 min read
Why you should use passive vulnerability scan on your website

Why you should use passive vulnerability scan on your website

2
Comments 2
2 min read
Store your Kubernetes Secrets in Git thanks to Kubeseal. Hello SealedSecret!

Store your Kubernetes Secrets in Git thanks to Kubeseal. Hello SealedSecret!

59
Comments 2
6 min read
Writeup: HackTheBox Bashed- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Bashed- Without Metasploit (OSCP Prep)

2
Comments
8 min read
Investigations in Windows on TryHackMe (1)

Investigations in Windows on TryHackMe (1)

8
Comments
4 min read
9 Best Practices & UX improvements for the two-factor authentication (2FA)

9 Best Practices & UX improvements for the two-factor authentication (2FA)

13
Comments
7 min read
SameSite Cookies and Why You Need Them

SameSite Cookies and Why You Need Them

8
Comments
7 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

20
Comments 1
5 min read
Putting Security in DevOps

Putting Security in DevOps

1
Comments
1 min read
Stop using your AWS Account root user

Stop using your AWS Account root user

17
Comments 2
3 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

7
Comments
1 min read
Using Cloudflare to serve your private Azure Storage Blobs

Using Cloudflare to serve your private Azure Storage Blobs

3
Comments
3 min read
Web Application Security Checklist (2021)

Web Application Security Checklist (2021)

232
Comments 2
44 min read
When should my startup prioritize infosec?

When should my startup prioritize infosec?

2
Comments
3 min read
Scan AWS IAM Keys In A Commit

Scan AWS IAM Keys In A Commit

8
Comments
2 min read
fail2ban: block ssh bruteforce attacks 🇬🇧

fail2ban: block ssh bruteforce attacks 🇬🇧

8
Comments
4 min read
Observability of software design - What it is and why it matters

Observability of software design - What it is and why it matters

24
Comments
5 min read
Bandit CTF — 6 to 10 Challenges Writeup

Bandit CTF — 6 to 10 Challenges Writeup

2
Comments
2 min read
IdentityServer4,ASP.NET Identity for Authentication & Authorization with ReactJS client

IdentityServer4,ASP.NET Identity for Authentication & Authorization with ReactJS client

16
Comments 4
3 min read
The Pitfalls of Employee Tracking In The Age Of Remote Working

The Pitfalls of Employee Tracking In The Age Of Remote Working

19
Comments 6
9 min read
Beginners Guide to Networking & Security

Beginners Guide to Networking & Security

1
Comments
16 min read
Dando permissões a usuários com Kubernetes

Dando permissões a usuários com Kubernetes

7
Comments
9 min read
Hashing Password combining with Salt in C# and VB.NET

Hashing Password combining with Salt in C# and VB.NET

11
Comments 4
2 min read
Know The Web: SOP (Same Origin Policy)

Know The Web: SOP (Same Origin Policy)

4
Comments
4 min read
An understanding of Spring Security

An understanding of Spring Security

2
Comments
1 min read
CSS Lint for Target _blank, noopener and noreferrer

CSS Lint for Target _blank, noopener and noreferrer

5
Comments
2 min read
Implement RBAC on Azure Key Vault

Implement RBAC on Azure Key Vault

10
Comments
2 min read
Hashing and why it is useful

Hashing and why it is useful

16
Comments
3 min read
Digital resilience: redundancy for websites and communications

Digital resilience: redundancy for websites and communications

2
Comments
5 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

23
Comments
10 min read
Trivy: scanning your containers for vulnerabilities

Trivy: scanning your containers for vulnerabilities

2
Comments
5 min read
My web security learnings: Cross-Site Scripting.

My web security learnings: Cross-Site Scripting.

16
Comments
3 min read
Apie CityBee ir slaptaĹľodĹľiĹł saugumÄ…

Apie CityBee ir slaptaĹľodĹľiĹł saugumÄ…

22
Comments 11
11 min read
How to Generate a Secure Random Number in Node.js

How to Generate a Secure Random Number in Node.js

12
Comments 4
2 min read
Control your npm packages & avoid dependency confusion

Control your npm packages & avoid dependency confusion

24
Comments 1
4 min read
7 Tips to Secure your Docker Container

7 Tips to Secure your Docker Container

10
Comments
5 min read
Keeping your Node.js projects secure with CI/CD

Keeping your Node.js projects secure with CI/CD

5
Comments
3 min read
Testing certificates generated by Traefik and Let's Encrypt 🔏

Testing certificates generated by Traefik and Let's Encrypt 🔏

5
Comments
5 min read
Know The Web: HTTP Cookie 🍪

Know The Web: HTTP Cookie 🍪

77
Comments 3
7 min read
Solve SECURITY Issues - a DevOps Perspective

Solve SECURITY Issues - a DevOps Perspective

6
Comments 1
2 min read
Open Source Tool Deepfence SecretScanner to Detect Secrets and Reduce Attack Surface

Open Source Tool Deepfence SecretScanner to Detect Secrets and Reduce Attack Surface

3
Comments
1 min read
Protecting your API keys with Next JS

Protecting your API keys with Next JS

101
Comments 15
3 min read
XXE (XML External Entity) Attack & Prevention

XXE (XML External Entity) Attack & Prevention

7
Comments
6 min read
TryHackMe's Advent of Cyber 11

TryHackMe's Advent of Cyber 11

3
Comments
2 min read
TryHackMe's Advent of Cyber 9-10

TryHackMe's Advent of Cyber 9-10

Comments
4 min read
How to Deploy to Azure with Least Privilege

How to Deploy to Azure with Least Privilege

20
Comments 5
13 min read
Achieving Cloud Native Security and Compliance with Teleport

Achieving Cloud Native Security and Compliance with Teleport

2
Comments
12 min read
Threat Modeling — Step by Step

Threat Modeling — Step by Step

9
Comments 2
4 min read
Hacking your application may be easier than you think

Hacking your application may be easier than you think

6
Comments
7 min read
14 Software Security Terms You Should Know

14 Software Security Terms You Should Know

7
Comments
3 min read
Getting started with GPG(GnuPG)

Getting started with GPG(GnuPG)

6
Comments 3
2 min read
loading...