DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Ways to secure APIs

Ways to secure APIs

Reactions 7 Comments
3 min read
Please remove that .git folder

Please remove that .git folder

Reactions 54 Comments 7
2 min read
How the software we build is used maliciously and abusively 🎙

How the software we build is used maliciously and abusively 🎙

Reactions 22 Comments
1 min read
Securing and caching your Hyperlambda endpoints

Securing and caching your Hyperlambda endpoints

Reactions 23 Comments 2
4 min read
Rust e segurança de memória

Rust e segurança de memória

Reactions 9 Comments
5 min read
Securing Kubernetes Secrets with HashiCorp Vault

Securing Kubernetes Secrets with HashiCorp Vault

Reactions 7 Comments
15 min read
Integrating MobSF REST API in React js

Integrating MobSF REST API in React js

Reactions 11 Comments
14 min read
Open Source News: June 2022

Open Source News: June 2022

Reactions 6 Comments
4 min read
Building your own Authentication!

Building your own Authentication!

Reactions 8 Comments 1
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

Reactions 13 Comments
2 min read
Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport

Protect and Access you Kubernetes, Servers, Applications and Databases with Teleport

Reactions 4 Comments
3 min read
Linux’s Cloud Init — Benefits, Quirks, and Drawbacks

Linux’s Cloud Init — Benefits, Quirks, and Drawbacks

Reactions 10 Comments
6 min read
Rogue APIs: A threat to your data?

Rogue APIs: A threat to your data?

Reactions 27 Comments 2
2 min read
Secure Spring Boot REST API with Apache APISIX API Gateway

Secure Spring Boot REST API with Apache APISIX API Gateway

Reactions 10 Comments 1
12 min read
How To Prevent Secrets From Ending Up On Developers' Machines

How To Prevent Secrets From Ending Up On Developers' Machines

Reactions 4 Comments
4 min read
Build a Password Generator and Deploy to Cloudfare Pages in 3 minutes

Build a Password Generator and Deploy to Cloudfare Pages in 3 minutes

Reactions 2 Comments
4 min read
Building a Security-First Culture As A Developer or Team

Building a Security-First Culture As A Developer or Team

Reactions 6 Comments
2 min read
Securing User Logins with MVC and JWT

Securing User Logins with MVC and JWT

Reactions 9 Comments
8 min read
Using Zero Trust Networking in Cloud Migrations

Using Zero Trust Networking in Cloud Migrations

Reactions 8 Comments
3 min read
Improving security & cryptography in popular cryptocurrency wallets

Improving security & cryptography in popular cryptocurrency wallets

Reactions 10 Comments
2 min read
Interesting project

Interesting project

Reactions 8 Comments 2
1 min read
Manually Updating .env Files Isn't DevOps

Manually Updating .env Files Isn't DevOps

Reactions 8 Comments
8 min read
A technical tale of NodeSecure - Chapter 2

A technical tale of NodeSecure - Chapter 2

Reactions 6 Comments
6 min read
Update for Host and Database.

Update for Host and Database.

Reactions 5 Comments
1 min read
LGPD e falsear dados sensĂ­veis no banco de dados - parte 2

LGPD e falsear dados sensĂ­veis no banco de dados - parte 2

Reactions 7 Comments
6 min read
Securing our internal tools

Securing our internal tools

Reactions 9 Comments
2 min read
What is Identity : Auth0

What is Identity : Auth0

Reactions 3 Comments
1 min read
Update Firefox products now to fix critical vulnerabilities

Update Firefox products now to fix critical vulnerabilities

Reactions 3 Comments
1 min read
Protect your AWS Account with specified IPs

Protect your AWS Account with specified IPs

Reactions 10 Comments 1
2 min read
Explained Simply: AWS IAM and Kubernetes RBAC

Explained Simply: AWS IAM and Kubernetes RBAC

Reactions 8 Comments
7 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

Reactions 7 Comments
20 min read
Symmetric vs Asymmetric Encryption

Symmetric vs Asymmetric Encryption

Reactions 17 Comments
3 min read
Need for Security Testing of Mobile Apps

Need for Security Testing of Mobile Apps

Reactions 2 Comments
5 min read
MQTT policy enforcement with Pipy

MQTT policy enforcement with Pipy

Reactions 8 Comments
4 min read
SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications

SSTIC 2022 - Symposium sur la sécurité des technologies de l'information et des communications

Reactions 8 Comments
12 min read
OpenID security configuration

OpenID security configuration

Reactions 7 Comments
2 min read
Ruby cryptographic gems

Ruby cryptographic gems

Reactions 8 Comments
3 min read
Learnings After 400 API Security Testing

Learnings After 400 API Security Testing

Reactions 9 Comments
2 min read
Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️

Daily Bugle: A Spiderman Themed Try Hack Me CTF 🕸️

Reactions 8 Comments
6 min read
10 Secure Coding Best Practices to Follow in Every Project

10 Secure Coding Best Practices to Follow in Every Project

Reactions 14 Comments
3 min read
Argo CD and Sealed Secrets is a perfect match

Argo CD and Sealed Secrets is a perfect match

Reactions 7 Comments
4 min read
Browser Fingerprinting: What Is It and How Does It Work?

Browser Fingerprinting: What Is It and How Does It Work?

Reactions 7 Comments
10 min read
Policy Sentry - IAM Least Privilege Policy Generator

Policy Sentry - IAM Least Privilege Policy Generator

Reactions 9 Comments
8 min read
How to restrict country to access your website with Netlify?

How to restrict country to access your website with Netlify?

Reactions 5 Comments
1 min read
Refresh Tokens: equilibrando segurança e usabilidade em aplicações!

Refresh Tokens: equilibrando segurança e usabilidade em aplicações!

Reactions 10 Comments 2
4 min read
Using CloudFormation StackSets to Onboard Hundreds of Member AWS Accounts

Using CloudFormation StackSets to Onboard Hundreds of Member AWS Accounts

Reactions 7 Comments
4 min read
Running Tomcat on Privileged Ports

Running Tomcat on Privileged Ports

Reactions 7 Comments
3 min read
RepoMetaScore: evaluate supply chain risks of open-source projects

RepoMetaScore: evaluate supply chain risks of open-source projects

Reactions 7 Comments 1
2 min read
Security in Laravel: How to Protect Your App Part 3

Security in Laravel: How to Protect Your App Part 3

Reactions 8 Comments 1
2 min read
Open Source is great and all, but to whom?

Open Source is great and all, but to whom?

Reactions 21 Comments
6 min read
All You should know about HTTP Host Header Injection

All You should know about HTTP Host Header Injection

Reactions 30 Comments 1
5 min read
Easily Produce a Software Bill of Materials with Cloud Native Buildpacks

Easily Produce a Software Bill of Materials with Cloud Native Buildpacks

Reactions 8 Comments
6 min read
Hack The Box Writeup: Cronos

Hack The Box Writeup: Cronos

Reactions 7 Comments
10 min read
Signing requests with AWS SDK in Lambda functions

Signing requests with AWS SDK in Lambda functions

Reactions 9 Comments
5 min read
Encrypting Folders on MacOS

Encrypting Folders on MacOS

Reactions 2 Comments
1 min read
Building your next application using blockchain: Why and how

Building your next application using blockchain: Why and how

Reactions 17 Comments
9 min read
Sign your code

Sign your code

Reactions 11 Comments
3 min read
Helpful commands for networks

Helpful commands for networks

Reactions 33 Comments
2 min read
Python .env

Python .env

Reactions 6 Comments
1 min read
Web Crawling VS Web Scraping: What Is the Difference?

Web Crawling VS Web Scraping: What Is the Difference?

Reactions 5 Comments 2
4 min read
loading...