DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
🛡️ Is Redmine affected by CVE-2022-32209 ?

🛡️ Is Redmine affected by CVE-2022-32209 ?

Reactions 5 Comments 1
1 min read
Here Are Other Spyware Like Pegasus That Snoop Into Mobile Phones

Here Are Other Spyware Like Pegasus That Snoop Into Mobile Phones

Reactions 5 Comments
3 min read
Script tag integrity attribute

Script tag integrity attribute

Reactions 7 Comments 1
2 min read
21 days of CTF: lessons learned

21 days of CTF: lessons learned

Reactions 7 Comments
3 min read
Top Auth0 alternatives: Auth0 vs Okta vs Cognito vs SuperTokens [2022]

Top Auth0 alternatives: Auth0 vs Okta vs Cognito vs SuperTokens [2022]

Reactions 7 Comments 1
8 min read
Introducing 1Password for Visual Studio Code

Introducing 1Password for Visual Studio Code

Reactions 8 Comments
5 min read
An easy and secure way to protect API Gateway endpoints

An easy and secure way to protect API Gateway endpoints

Reactions 10 Comments
4 min read
Ways to secure APIs

Ways to secure APIs

Reactions 10 Comments
3 min read
How to using JWT based Authentication with RingCentral APIs in a Spring Boot App

How to using JWT based Authentication with RingCentral APIs in a Spring Boot App

Reactions 7 Comments
4 min read
Rust e segurança de memória

Rust e segurança de memória

Reactions 9 Comments
5 min read
Integrating MobSF REST API in React js

Integrating MobSF REST API in React js

Reactions 11 Comments
14 min read
Open Source News: June 2022

Open Source News: June 2022

Reactions 6 Comments
4 min read
Building your own Authentication!

Building your own Authentication!

Reactions 8 Comments 1
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

Reactions 13 Comments
2 min read
Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport

Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport

Reactions 4 Comments
3 min read
Securing and caching your Hyperlambda endpoints

Securing and caching your Hyperlambda endpoints

Reactions 25 Comments 2
4 min read
Linux’s Cloud Init — Benefits, Quirks, and Drawbacks

Linux’s Cloud Init — Benefits, Quirks, and Drawbacks

Reactions 10 Comments
6 min read
Secure Spring Boot REST API with Apache APISIX API Gateway

Secure Spring Boot REST API with Apache APISIX API Gateway

Reactions 11 Comments 1
12 min read
Securing Kubernetes Secrets with HashiCorp Vault

Securing Kubernetes Secrets with HashiCorp Vault

Reactions 9 Comments
15 min read
How To Prevent Secrets From Ending Up On Developers' Machines

How To Prevent Secrets From Ending Up On Developers' Machines

Reactions 4 Comments
4 min read
Building a Security-First Culture As A Developer or Team

Building a Security-First Culture As A Developer or Team

Reactions 6 Comments
2 min read
Using Zero Trust Networking in Cloud Migrations

Using Zero Trust Networking in Cloud Migrations

Reactions 8 Comments
3 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

Reactions 10 Comments
2 min read
Interesting project

Interesting project

Reactions 8 Comments 2
1 min read
Manually Updating .env Files Isn't DevOps

Manually Updating .env Files Isn't DevOps

Reactions 8 Comments
8 min read
A technical tale of NodeSecure - Chapter 2

A technical tale of NodeSecure - Chapter 2

Reactions 6 Comments
6 min read
Update for Host and Database.

Update for Host and Database.

Reactions 5 Comments
1 min read
How the software we build is used maliciously and abusively 🎙

How the software we build is used maliciously and abusively 🎙

Reactions 33 Comments
1 min read
LGPD e falsear dados sensĂ­veis no banco de dados - parte 2

LGPD e falsear dados sensĂ­veis no banco de dados - parte 2

Reactions 7 Comments
6 min read
Securing our internal tools

Securing our internal tools

Reactions 9 Comments
2 min read
Rogue APIs: A threat to your data?

Rogue APIs: A threat to your data?

Reactions 26 Comments 2
2 min read
What is Identity : Auth0

What is Identity : Auth0

Reactions 3 Comments
1 min read
Build a Password Generator and Deploy to Cloudfare Pages in 3 minutes

Build a Password Generator and Deploy to Cloudfare Pages in 3 minutes

Reactions 2 Comments
4 min read
Update Firefox products now to fix critical vulnerabilities

Update Firefox products now to fix critical vulnerabilities

Reactions 3 Comments
1 min read
Protect your AWS Account with specified IPs

Protect your AWS Account with specified IPs

Reactions 10 Comments 1
2 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

Reactions 7 Comments
20 min read
Please remove that .git folder

Please remove that .git folder

Reactions 138 Comments 18
2 min read
Symmetric vs Asymmetric Encryption

Symmetric vs Asymmetric Encryption

Reactions 17 Comments
3 min read
Need for Security Testing of Mobile Apps

Need for Security Testing of Mobile Apps

Reactions 2 Comments
5 min read
MQTT policy enforcement with Pipy

MQTT policy enforcement with Pipy

Reactions 8 Comments
4 min read
SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications

SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications

Reactions 8 Comments
12 min read
OpenID security configuration

OpenID security configuration

Reactions 7 Comments
2 min read
Ruby cryptographic gems

Ruby cryptographic gems

Reactions 8 Comments
3 min read
Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️

Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️

Reactions 8 Comments
6 min read
Learnings After 400 API Security Testing

Learnings After 400 API Security Testing

Reactions 9 Comments
2 min read
10 Secure Coding Best Practices to Follow in Every Project

10 Secure Coding Best Practices to Follow in Every Project

Reactions 14 Comments
3 min read
Argo CD and Sealed Secrets is a perfect match

Argo CD and Sealed Secrets is a perfect match

Reactions 7 Comments
4 min read
Browser Fingerprinting: What Is It and How Does It Work?

Browser Fingerprinting: What Is It and How Does It Work?

Reactions 7 Comments
10 min read
Securing User Logins with MVC and JWT

Securing User Logins with MVC and JWT

Reactions 9 Comments
8 min read
Explained Simply: AWS IAM and Kubernetes RBAC

Explained Simply: AWS IAM and Kubernetes RBAC

Reactions 8 Comments
7 min read
Policy Sentry - IAM Least Privilege Policy Generator

Policy Sentry - IAM Least Privilege Policy Generator

Reactions 9 Comments
8 min read
How to restrict country to access your website with Netlify?

How to restrict country to access your website with Netlify?

Reactions 5 Comments
1 min read
Refresh Tokens: equilibrando segurança e usabilidade em aplicações!

Refresh Tokens: equilibrando segurança e usabilidade em aplicações!

Reactions 10 Comments 2
4 min read
Using CloudFormation StackSets to Onboard Hundreds of Member AWS Accounts

Using CloudFormation StackSets to Onboard Hundreds of Member AWS Accounts

Reactions 7 Comments
4 min read
Running Tomcat on Privileged Ports

Running Tomcat on Privileged Ports

Reactions 7 Comments
3 min read
RepoMetaScore: evaluate supply chain risks of open-source projects

RepoMetaScore: evaluate supply chain risks of open-source projects

Reactions 7 Comments 1
2 min read
Security in Laravel: How to Protect Your App Part 3

Security in Laravel: How to Protect Your App Part 3

Reactions 8 Comments 1
2 min read
Open Source is great and all, but to whom?

Open Source is great and all, but to whom?

Reactions 20 Comments 1
7 min read
All You should know about HTTP Host Header Injection

All You should know about HTTP Host Header Injection

Reactions 30 Comments 1
5 min read
Easily Produce a Software Bill of Materials with Cloud Native Buildpacks

Easily Produce a Software Bill of Materials with Cloud Native Buildpacks

Reactions 8 Comments
6 min read
loading...