DEV Community

loading...

# security

👋 Sign in for the ability sort posts by top and latest.
Damn Vulnerable GraphQL Application

Damn Vulnerable GraphQL Application

Reactions 15 Comments
3 min read
Top 5 Password managers for Mac

Top 5 Password managers for Mac

Reactions 3 Comments
2 min read
How to support Apple iCloud Passkeys with WebAuthn on iOS 15 and macOS Monterey

How to support Apple iCloud Passkeys with WebAuthn on iOS 15 and macOS Monterey

Reactions 5 Comments
11 min read
Using Kyverno To Enforce EKS Best Practices

Using Kyverno To Enforce EKS Best Practices

Reactions 9 Comments
5 min read
S3 Same-Region Replication (SRR) vs Cross-Region Replication (CRR)

S3 Same-Region Replication (SRR) vs Cross-Region Replication (CRR)

Reactions 3 Comments
2 min read
XSS Attack - Is your Application Vulnerable? - npm packages can make you vulnerable!!!

XSS Attack - Is your Application Vulnerable? - npm packages can make you vulnerable!!!

Reactions 3 Comments
1 min read
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

Reactions 7 Comments
7 min read
How to NOT secure web payment systems

How to NOT secure web payment systems

Reactions 2 Comments
5 min read
How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

Reactions 2 Comments
8 min read
Azure Update Management

Azure Update Management

Reactions 4 Comments
3 min read
WAF for ALBs

WAF for ALBs

Reactions 6 Comments
2 min read
Backup and Recovery Security Standards

Backup and Recovery Security Standards

Reactions 2 Comments
5 min read
How to Convert LV or MD RAID1 and 0 Into RAID5 Without Losing Data

How to Convert LV or MD RAID1 and 0 Into RAID5 Without Losing Data

Reactions 4 Comments
7 min read
Exploit Website Databases Using SQLmap

Exploit Website Databases Using SQLmap

Reactions 2 Comments
2 min read
TryHackMe TShark

TryHackMe TShark

Reactions 2 Comments
2 min read
Django : ReCaptha Everywhere

Django : ReCaptha Everywhere

Reactions 3 Comments
3 min read
Security news weekly round-up - 4th June 2021

Security news weekly round-up - 4th June 2021

Reactions 2 Comments
4 min read
Top 11 Email Security Risks in 2021

Top 11 Email Security Risks in 2021

Reactions 1 Comments
5 min read
Improving security of your apps' source-code in a few minutes

Improving security of your apps' source-code in a few minutes

Reactions 5 Comments
4 min read
OWASP, Vulnerabilities, and Taint Analysis in PVS-Studio for C#. Stir, but Don't Shake

OWASP, Vulnerabilities, and Taint Analysis in PVS-Studio for C#. Stir, but Don't Shake

Reactions 6 Comments
13 min read
Software Security Crash Course

Software Security Crash Course

Reactions 19 Comments
6 min read
Securing a Serverless Multi-Tenancy Puppeteer Service

Securing a Serverless Multi-Tenancy Puppeteer Service

Reactions 2 Comments
3 min read
Securing Azure Logic apps with Private Endpoints

Securing Azure Logic apps with Private Endpoints

Reactions 8 Comments
6 min read
How to store and rotate database credentials using AWS Secret Manager

How to store and rotate database credentials using AWS Secret Manager

Reactions 7 Comments 4
6 min read
React Protected Routes (Next js & CRA) simple but efficient

React Protected Routes (Next js & CRA) simple but efficient

Reactions 24 Comments 3
2 min read
NodeJS Basics: Fixing Dependency Security Issues

NodeJS Basics: Fixing Dependency Security Issues

Reactions 3 Comments
1 min read
How to setup 2way ssl authentication (mutual authentication) with Nginx

How to setup 2way ssl authentication (mutual authentication) with Nginx

Reactions 2 Comments
6 min read
Multi-Region KMS Keys and its use cases

Multi-Region KMS Keys and its use cases

Reactions 2 Comments
5 min read
Configuring 2FA on your Linux Server

Configuring 2FA on your Linux Server

Reactions 6 Comments
3 min read
Cryptography- Shift Cipher

Cryptography- Shift Cipher

Reactions 6 Comments 1
4 min read
Creating a Whitelist for a Secrets Manager Secret

Creating a Whitelist for a Secrets Manager Secret

Reactions 3 Comments
4 min read
Exploring the Export Table [Windows PE Internals]

Exploring the Export Table [Windows PE Internals]

Reactions 5 Comments
4 min read
Django Defense Against Bot

Django Defense Against Bot

Reactions 2 Comments
2 min read
Django-Honeypot

Django-Honeypot

Reactions 2 Comments
1 min read
Django Admin Honeypot

Django Admin Honeypot

Reactions 2 Comments
2 min read
How to Keep Configuration Secrets out of a Django Project

How to Keep Configuration Secrets out of a Django Project

Reactions 11 Comments
2 min read
Need guidance with securing the REST API from DDoS

Need guidance with securing the REST API from DDoS

Reactions 2 Comments 3
1 min read
WordPress forgotten password localhost hack

WordPress forgotten password localhost hack

Reactions 2 Comments 2
2 min read
ACM PCA implementation

ACM PCA implementation

Reactions 2 Comments
4 min read
How to invalidate a compromised JWT

How to invalidate a compromised JWT

Reactions 4 Comments 2
4 min read
Exploiting Visual Studio Code Devcontainers

Exploiting Visual Studio Code Devcontainers

Reactions 7 Comments
5 min read
How to Protect Cookies Against Common XSS Attacks on the Web?

How to Protect Cookies Against Common XSS Attacks on the Web?

Reactions 6 Comments
1 min read
How Fuzzing with QEMU (and AFL) Works

How Fuzzing with QEMU (and AFL) Works

Reactions 6 Comments
7 min read
Simple Remote Code Execution on EJS Web Applications with express-fileupload

Simple Remote Code Execution on EJS Web Applications with express-fileupload

Reactions 4 Comments 2
6 min read
Why you need an SSH Access Manager - Part 2

Why you need an SSH Access Manager - Part 2

Reactions 14 Comments
3 min read
TryHackMe DNS in Detail

TryHackMe DNS in Detail

Reactions 4 Comments
3 min read
Sharing your loan details to anyone

Sharing your loan details to anyone

Reactions 4 Comments
2 min read
[Python] Coding a TCP Room in 200 lines

[Python] Coding a TCP Room in 200 lines

Reactions 9 Comments
7 min read
How To Improve Web Application Security?

How To Improve Web Application Security?

Reactions 6 Comments 1
4 min read
AWS API Gateway Best Practices in-depth

AWS API Gateway Best Practices in-depth

Reactions 13 Comments
4 min read
🔴 TechTalk - How to become a Secure Developer in 2021 with Liran Tal

🔴 TechTalk - How to become a Secure Developer in 2021 with Liran Tal

Reactions 7 Comments
1 min read
Security Checklist 1

Security Checklist 1

Reactions 2 Comments
6 min read
What Is SSH and How Does It Work?

What Is SSH and How Does It Work?

Reactions 53 Comments 1
3 min read
Physical Security

Physical Security

Reactions 2 Comments
3 min read
5 NPM Packages to Secure Your Node.js Backend in 5 Minutes

5 NPM Packages to Secure Your Node.js Backend in 5 Minutes

Reactions 164 Comments 5
3 min read
keycloak + Azure Active Directory

keycloak + Azure Active Directory

Reactions 2 Comments
12 min read
How to implement an inline styles Content Security Policy with Angular and Nginx

How to implement an inline styles Content Security Policy with Angular and Nginx

Reactions 7 Comments 1
4 min read
How to version control Cloud?

How to version control Cloud?

Reactions 6 Comments
6 min read
Securing Azure SignalR +Azure App Service - Part 3

Securing Azure SignalR +Azure App Service - Part 3

Reactions 6 Comments
4 min read
CSP - Content Security Policy

CSP - Content Security Policy

Reactions 35 Comments 1
3 min read
loading...
Forem Open with the Forem app