DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

87
Comments 7
8 min read
Mastering JWT Security

Mastering JWT Security

83
Comments 18
3 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

34
Comments
6 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

26
Comments
14 min read
The XZ attack and timeline

The XZ attack and timeline

23
Comments 3
6 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

20
Comments
6 min read
Power Platform - DLP Policies

Power Platform - DLP Policies

19
Comments 1
6 min read
Are hackers watching your screen right now?

Are hackers watching your screen right now?

18
Comments 1
3 min read
CORS Error Explained and How to Fix It?

CORS Error Explained and How to Fix It?

18
Comments 3
3 min read
Make your Azure OpenAI apps compliant with RBAC

Make your Azure OpenAI apps compliant with RBAC

16
Comments
6 min read
7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

16
Comments
4 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 6
4 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

9
Comments
3 min read
12 Free Courses To Help You Develop More Secure Software - Shift Security Left

12 Free Courses To Help You Develop More Secure Software - Shift Security Left

9
Comments
6 min read
Understanding Security Group and Network Access Control List (NACL) in AWS

Understanding Security Group and Network Access Control List (NACL) in AWS

9
Comments
3 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

8
Comments
11 min read
Authentication using JSON Web Tokens.

Authentication using JSON Web Tokens.

8
Comments
4 min read
Migrating to Chainguard Images: less CVEs for safer container runtimes

Migrating to Chainguard Images: less CVEs for safer container runtimes

8
Comments 1
3 min read
Why using a passphrase to secure your SSH key ?

Why using a passphrase to secure your SSH key ?

7
Comments
2 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

7
Comments
16 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Securing Apps In React Native

Securing Apps In React Native

6
Comments
3 min read
How to restrict default access to KMS via key policy with Terraform

How to restrict default access to KMS via key policy with Terraform

6
Comments 1
4 min read
Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images

6
Comments
7 min read
Bridging Code and Security: Unveiling the Power of DevSecOps

Bridging Code and Security: Unveiling the Power of DevSecOps

6
Comments
13 min read
PrivatePing - A Secure Messaging Application

PrivatePing - A Secure Messaging Application

5
Comments
2 min read
How to generate a secure and robust SSH key in 2024

How to generate a secure and robust SSH key in 2024

5
Comments
2 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
El Secreto Mejor Guardado de AWS: Protegiendo tu IA Generativa

El Secreto Mejor Guardado de AWS: Protegiendo tu IA Generativa

5
Comments
5 min read
🔐Simple Yet Crucial step to avoid security incidents💡

🔐Simple Yet Crucial step to avoid security incidents💡

5
Comments
1 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
Using Bitcoin and Blockchain ideas to Secure our AI Chatbot

Using Bitcoin and Blockchain ideas to Secure our AI Chatbot

5
Comments 2
9 min read
Extending legacy healthcare software: RPA technology

Extending legacy healthcare software: RPA technology

5
Comments
4 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
How to secure an existing SSH key with a passphrase

How to secure an existing SSH key with a passphrase

5
Comments
2 min read
API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

5
Comments
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

4
Comments
6 min read
Security : CVE-2024-3094 unauthorized remote SSH access

Security : CVE-2024-3094 unauthorized remote SSH access

3
Comments
2 min read
Solving AWS Network Puzzles with Mathematics - Part 1

Solving AWS Network Puzzles with Mathematics - Part 1

3
Comments
7 min read
Explore the Avenues of Building a Career in Cyber Security

Explore the Avenues of Building a Career in Cyber Security

3
Comments
3 min read
Exploring the World of SAST and DAST with a DevSecOps Twist

Exploring the World of SAST and DAST with a DevSecOps Twist

3
Comments
4 min read
Improving user experience with passwordless authentication

Improving user experience with passwordless authentication

3
Comments
5 min read
Protect API Gateway with Amazon Verified Permissions

Protect API Gateway with Amazon Verified Permissions

3
Comments
8 min read
AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

3
Comments
4 min read
How To Implement AWS SSB Controls in Terraform - Part 3

How To Implement AWS SSB Controls in Terraform - Part 3

3
Comments
15 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

2
Comments
3 min read
Enhancing API Security: Best Practices for Developers

Enhancing API Security: Best Practices for Developers

2
Comments 2
2 min read
Automatización para la creación de imágenes con Amazon EC2 Image Builder

Automatización para la creación de imágenes con Amazon EC2 Image Builder

2
Comments
14 min read
Security: move your SSH keys to an encrypted location

Security: move your SSH keys to an encrypted location

2
Comments
1 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
GitHub: signing commit in a workflow

GitHub: signing commit in a workflow

2
Comments
2 min read
loading...