DEV Community

# applicationsecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Importance of Web Application Firewall defending against Cyber Threats.

The Importance of Web Application Firewall defending against Cyber Threats.

Comments
2 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Application Security vs. Software Security: Difference to Know

Application Security vs. Software Security: Difference to Know

Comments
2 min read
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant

The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant

Comments
4 min read
Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)

Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)

1
Comments 1
5 min read
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Comments
8 min read
A denial of service Regex breaks FastAPI security

A denial of service Regex breaks FastAPI security

1
Comments
7 min read
The strategic value of a Security Champions Program.

The strategic value of a Security Champions Program.

2
Comments
1 min read
Polyfill supply chain attack embeds malware in JavaScript CDN assets

Polyfill supply chain attack embeds malware in JavaScript CDN assets

210
Comments 6
5 min read
How to secure a REST API?

How to secure a REST API?

2
Comments
11 min read
Breaking caches and bypassing Istio RBAC with HTTP response header injection

Breaking caches and bypassing Istio RBAC with HTTP response header injection

2
Comments
11 min read
Integrating the Snyk Language Server with IntelliJ IDEs

Integrating the Snyk Language Server with IntelliJ IDEs

Comments 1
2 min read
Essential Node.js backend examples for developers in 2024

Essential Node.js backend examples for developers in 2024

6
Comments 2
10 min read
OWASP® Cornucopia 2.0

OWASP® Cornucopia 2.0

25
Comments 1
6 min read
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

Comments 2
2 min read
Fastify plugins as building blocks for a backend Node.js API

Fastify plugins as building blocks for a backend Node.js API

5
Comments
10 min read
How to secure Python Flask applications

How to secure Python Flask applications

27
Comments
17 min read
How to install Java on macOS

How to install Java on macOS

1
Comments
12 min read
Symmetric vs. asymmetric encryption: Practical Python examples

Symmetric vs. asymmetric encryption: Practical Python examples

3
Comments
16 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

2
Comments
4 min read
360 degrees of application security with Snyk

360 degrees of application security with Snyk

3
Comments
6 min read
Snyk Learn and the NIST Cybersecurity Framework (CSF)

Snyk Learn and the NIST Cybersecurity Framework (CSF)

3
Comments
3 min read
5 Node.js security code snippets every backend developer should know

5 Node.js security code snippets every backend developer should know

2
Comments
9 min read
Preventing SQL injection attacks in Node.js

Preventing SQL injection attacks in Node.js

10
Comments
9 min read
10 GitHub Security Best Practices

10 GitHub Security Best Practices

3
Comments
14 min read
New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends

New Year's security resolutions for 2024 from Snyk DevRel, SecRel, and friends

2
Comments
5 min read
Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE?

Vulnerability disclosure: Which comes first, the security bug in PHP or the CVE?

3
Comments
4 min read
Enhancing code to cloud security with the Common Configuration Scoring System

Enhancing code to cloud security with the Common Configuration Scoring System

5
Comments
5 min read
Secure password hashing in Go

Secure password hashing in Go

10
Comments 1
12 min read
Handling security vulnerabilities in Spring Boot

Handling security vulnerabilities in Spring Boot

5
Comments 2
6 min read
How to integrate ASPM with your application security program

How to integrate ASPM with your application security program

1
Comments
5 min read
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools

Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools

2
Comments
6 min read
What’s new in CVSS 4.0

What’s new in CVSS 4.0

Comments
8 min read
How to secure JavaScript applications right from the CLI

How to secure JavaScript applications right from the CLI

1
Comments 2
11 min read
GitHub Copilot code security: XSS in React

GitHub Copilot code security: XSS in React

4
Comments 1
8 min read
Security implications of cross-origin resource sharing (CORS) in Node.js

Security implications of cross-origin resource sharing (CORS) in Node.js

2
Comments 1
11 min read
How to avoid web cache poisoning attacks

How to avoid web cache poisoning attacks

1
Comments
8 min read
Does GitOps enhance application security?

Does GitOps enhance application security?

1
Comments
4 min read
Can machines dream of secure code? From AI hallucinations to software vulnerabilities

Can machines dream of secure code? From AI hallucinations to software vulnerabilities

10
Comments
9 min read
SocketSleuth: Improving security testing for WebSocket applications

SocketSleuth: Improving security testing for WebSocket applications

2
Comments
4 min read
Streamline dependency updates with Mergify and Snyk

Streamline dependency updates with Mergify and Snyk

1
Comments
7 min read
XS leaks: What they are and how to avoid them

XS leaks: What they are and how to avoid them

1
Comments
9 min read
How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
.NET developers alert: Moq NuGET package exfiltrates user emails from git

.NET developers alert: Moq NuGET package exfiltrates user emails from git

7
Comments
4 min read
How secure is WebAssembly? 5 security concerns unique to WebAssembly

How secure is WebAssembly? 5 security concerns unique to WebAssembly

6
Comments
6 min read
8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Finding and fixing insecure direct object references in Python

Finding and fixing insecure direct object references in Python

1
Comments
6 min read
Using insecure npm package manager defaults to steal your macOS keyboard shortcuts

Using insecure npm package manager defaults to steal your macOS keyboard shortcuts

Comments
5 min read
Level up your security skillset with New Relic

Level up your security skillset with New Relic

Comments
6 min read
Ethical hacking techniques

Ethical hacking techniques

1
Comments
7 min read
How to prevent XPath injection attacks

How to prevent XPath injection attacks

4
Comments
8 min read
The importance of platform engineers in a security program

The importance of platform engineers in a security program

1
Comments
4 min read
A quick primer on LDAP injection

A quick primer on LDAP injection

1
Comments
6 min read
How to perform JavaBeans Validation

How to perform JavaBeans Validation

4
Comments
7 min read
Data loss prevention for developers

Data loss prevention for developers

1
Comments
10 min read
The SecurityManager is getting removed in Java: What that means for you

The SecurityManager is getting removed in Java: What that means for you

1
Comments
10 min read
Gitpod remote code execution 0-day vulnerability via WebSockets

Gitpod remote code execution 0-day vulnerability via WebSockets

Comments
9 min read
Node.js multithreading with worker threads: pros and cons

Node.js multithreading with worker threads: pros and cons

1
Comments 2
9 min read
The security concerns of a JavaScript sandbox with the Node.js VM module

The security concerns of a JavaScript sandbox with the Node.js VM module

4
Comments
5 min read
Using Python libraries for secure network communication

Using Python libraries for secure network communication

3
Comments
4 min read
loading...