DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Greenplum's Giggly Glitch

Greenplum's Giggly Glitch

7
Comments
2 min read
Validate an OpenID Connect JWT using a public key in JWKS

Validate an OpenID Connect JWT using a public key in JWKS

Comments
4 min read
Breaking and building encryption in NFC digital wallets 📳

Breaking and building encryption in NFC digital wallets 📳

4
Comments
2 min read
Demystifying GraphQL Security: A Comprehensive Guide to Introspection

Demystifying GraphQL Security: A Comprehensive Guide to Introspection

23
Comments
5 min read
The Old Faithful: Why SSM Parameter Store still reigns over Secrets Manager

The Old Faithful: Why SSM Parameter Store still reigns over Secrets Manager

3
Comments
7 min read
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

3
Comments
3 min read
Protect Your Express.js App from XSS Attacks

Protect Your Express.js App from XSS Attacks

Comments
2 min read
Identity Wallet Concept

Identity Wallet Concept

Comments
4 min read
How to use Kubernetes Secret to pull private Docker Images from DockerHub

How to use Kubernetes Secret to pull private Docker Images from DockerHub

Comments
2 min read
Korunuyor musunuz?

Korunuyor musunuz?

Comments 2
4 min read
Quebrando pipelines Jenkins no Windows

Quebrando pipelines Jenkins no Windows

2
Comments
2 min read
Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Comments
7 min read
Spring Security and OpenID Connect

Spring Security and OpenID Connect

Comments
8 min read
Depend(abot) on Umbraco patching

Depend(abot) on Umbraco patching

1
Comments
3 min read
How to scan your ruby or JS project for security improvements, for free.

How to scan your ruby or JS project for security improvements, for free.

2
Comments
3 min read
Hack The Box Writeup - Shoppy

Hack The Box Writeup - Shoppy

Comments
22 min read
Automated Fuzz Testing: The Power of Code Intelligence App

Automated Fuzz Testing: The Power of Code Intelligence App

8
Comments
5 min read
5 ways for GitLab CI runners to get AWS credentials

5 ways for GitLab CI runners to get AWS credentials

Comments
11 min read
The Web3 Security Guide: Protecting Your Digital Assets in a Decentralized World

The Web3 Security Guide: Protecting Your Digital Assets in a Decentralized World

67
Comments 17
3 min read
Boas pråticas de segurança para AWS CLI

Boas pråticas de segurança para AWS CLI

1
Comments
3 min read
Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

2
Comments
4 min read
Keeping Your WordPress Website Safe and Secure with WP White Security

Keeping Your WordPress Website Safe and Secure with WP White Security

2
Comments
7 min read
Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide

Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide

6
Comments
14 min read
Let’s scan DEV’s forem project with Bearer and analyze the results

Let’s scan DEV’s forem project with Bearer and analyze the results

14
Comments
7 min read
Running a Docker Container with a Custom Non-Root User: Syncing Host and Container Permissions

Running a Docker Container with a Custom Non-Root User: Syncing Host and Container Permissions

Comments
4 min read
How use Access Control Rules and GRUD in Laravel 10 (Tutorial step by step)

How use Access Control Rules and GRUD in Laravel 10 (Tutorial step by step)

2
Comments
16 min read
Hacking AWS Account via AWS Lambda SSRF

Hacking AWS Account via AWS Lambda SSRF

6
Comments
3 min read
Reinventing IBM | DevSecOps, AI, Quantum Computing

Reinventing IBM | DevSecOps, AI, Quantum Computing

17
Comments 1
2 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
Spring Cloud Gateway Combined with the Security Practice of OAuth2.0 Protocol

Spring Cloud Gateway Combined with the Security Practice of OAuth2.0 Protocol

3
Comments
13 min read
What is Hashicorp Vault? Manage your secrets in production.

What is Hashicorp Vault? Manage your secrets in production.

1
Comments
2 min read
Choosing Between SOCKS vs HTTP Proxy

Choosing Between SOCKS vs HTTP Proxy

Comments
9 min read
A Complete Guide to Database Security Testing

A Complete Guide to Database Security Testing

5
Comments 1
3 min read
Filter PNGs for Acropalypse using Compute@Edge

Filter PNGs for Acropalypse using Compute@Edge

6
Comments
6 min read
The Importance of Security Operations Center (SOC)

The Importance of Security Operations Center (SOC)

5
Comments
8 min read
Secure Terraform - Part 3 - terrascan

Secure Terraform - Part 3 - terrascan

Comments
4 min read
Best practice for artifacts downloading

Best practice for artifacts downloading

Comments
3 min read
Setup CloudFront & Amazon S3 to Deliver objects on the Web Apps (securely & efficiently)

Setup CloudFront & Amazon S3 to Deliver objects on the Web Apps (securely & efficiently)

9
Comments
6 min read
Scalable, Producer-Consumer-based, Remote Log Monitor in Python

Scalable, Producer-Consumer-based, Remote Log Monitor in Python

2
Comments
4 min read
Spring Security OAuth2 Login

Spring Security OAuth2 Login

1
Comments
9 min read
How to Use Chrome Browser Proxy Settings

How to Use Chrome Browser Proxy Settings

1
Comments
6 min read
Why you should choose AWS when migrating to the cloud

Why you should choose AWS when migrating to the cloud

1
Comments
4 min read
Over 150,000 .NET Developers Hit by Harmful NuGet Packages

Over 150,000 .NET Developers Hit by Harmful NuGet Packages

25
Comments 1
5 min read
A Beginner's Guide to AWS Identity and Access Management (IAM)

A Beginner's Guide to AWS Identity and Access Management (IAM)

7
Comments
4 min read
Hacking 101: Common Attacks and How to Stop Them

Hacking 101: Common Attacks and How to Stop Them

1
Comments
5 min read
The State of Public APIs 2023

The State of Public APIs 2023

31
Comments 3
2 min read
Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

2
Comments
7 min read
mTLS everywhere!

mTLS everywhere!

33
Comments
11 min read
QuillCTF: 9. WETH10

QuillCTF: 9. WETH10

1
Comments
3 min read
QuillCTF: 8. Pelusa

QuillCTF: 8. Pelusa

Comments
5 min read
Converting string to enum at the cost of 50 GB: CVE-2020-36620

Converting string to enum at the cost of 50 GB: CVE-2020-36620

14
Comments 3
6 min read
Rust Realtime OTP Algorithm

Rust Realtime OTP Algorithm

6
Comments
2 min read
Serverless querying and evaluating of Logs using Athena Part 2

Serverless querying and evaluating of Logs using Athena Part 2

4
Comments
2 min read
Building a multitenant web application with Spring Boot

Building a multitenant web application with Spring Boot

2
Comments
9 min read
A Beginner's Guide to AWS Virtual Private Cloud (VPC) Security

A Beginner's Guide to AWS Virtual Private Cloud (VPC) Security

5
Comments 2
4 min read
Comparing Confidential Computing Alternatives in the Cloud

Comparing Confidential Computing Alternatives in the Cloud

3
Comments 1
4 min read
Part 3. Token exchange from GCP to Azure

Part 3. Token exchange from GCP to Azure

1
Comments
4 min read
Part 2. Token exchange from Azure to GCP

Part 2. Token exchange from Azure to GCP

1
Comments
6 min read
How To Prevent HPP and XSS Attacks In Nodejs

How To Prevent HPP and XSS Attacks In Nodejs

6
Comments
2 min read
Using OpenId Connect with Confluent Cloud

Using OpenId Connect with Confluent Cloud

2
Comments
4 min read
loading...