DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is FIDO? — The Future of Secure and Passwordless Authentication

What is FIDO? — The Future of Secure and Passwordless Authentication

1
Comments
4 min read
Transition to OpenTelemetry, enhanced policy testing, and more - Cerbos v0.32

Transition to OpenTelemetry, enhanced policy testing, and more - Cerbos v0.32

1
Comments
2 min read
Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Comments
5 min read
Effective Adversary Emulation

Effective Adversary Emulation

Comments
13 min read
Understanding Kubernetes Authentication and Authorization

Understanding Kubernetes Authentication and Authorization

Comments
2 min read
What is Rego and how do you use it?

What is Rego and how do you use it?

Comments
1 min read
What is the TCP/IP model

What is the TCP/IP model

Comments
6 min read
What are JWT?

What are JWT?

Comments
6 min read
What is JWT (Json Web Token)

What is JWT (Json Web Token)

Comments
2 min read
HackTheBox — Writeup Pilgrimage [Retired]

HackTheBox — Writeup Pilgrimage [Retired]

Comments
12 min read
What is Security and the AWS Shared Responsibility Model

What is Security and the AWS Shared Responsibility Model

Comments
2 min read
#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

Comments
3 min read
Demystifying IP Addresses with is.ipv4 and is.not_ipv4 from 'thiis': Your Friendly Guide to IP Validation

Demystifying IP Addresses with is.ipv4 and is.not_ipv4 from 'thiis': Your Friendly Guide to IP Validation

Comments 1
5 min read
Can you become an Ethical Hacker without a degree?

Can you become an Ethical Hacker without a degree?

2
Comments
3 min read
Azure Data Storage Solutions: Enhancing Performance & Security for Cloud Architects

Azure Data Storage Solutions: Enhancing Performance & Security for Cloud Architects

1
Comments
2 min read
HackTheBox - Writeup Unobtainium [Retired]

HackTheBox - Writeup Unobtainium [Retired]

Comments
26 min read
Extraction of Artifacts from an NTFS Image File Using ntfsdump and ntfsfind

Extraction of Artifacts from an NTFS Image File Using ntfsdump and ntfsfind

Comments
3 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Comments
8 min read
What to do if you expose a secret: How to stay calm and respond to an incident

What to do if you expose a secret: How to stay calm and respond to an incident

Comments
12 min read
Beyond the login page

Beyond the login page

9
Comments 1
4 min read
Optimise Sign-In Experience. Free Ebook [Get PDF]

Optimise Sign-In Experience. Free Ebook [Get PDF]

Comments
2 min read
The Secure Path Forward for eBPF runtime: Challenges and Innovations

The Secure Path Forward for eBPF runtime: Challenges and Innovations

3
Comments
16 min read
Securing CI/CD Images with Cosign and OPA

Securing CI/CD Images with Cosign and OPA

Comments
5 min read
Explore web applications through their content security policy (CSP)

Explore web applications through their content security policy (CSP)

8
Comments
5 min read
Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Comments
5 min read
Interceptando mensagens de erro com o nginx

Interceptando mensagens de erro com o nginx

Comments
4 min read
Exploit Development: Buffer Overflows

Exploit Development: Buffer Overflows

10
Comments
3 min read
Open redirect vulnerabilities in Rails apps

Open redirect vulnerabilities in Rails apps

Comments
2 min read
Guia de passo a passo para escrever um exploit.

Guia de passo a passo para escrever um exploit.

6
Comments
11 min read
Kubescape 3.0 is available to enhance your K8s security experience

Kubescape 3.0 is available to enhance your K8s security experience

1
Comments
1 min read
Clean authorization control in serverless functions

Clean authorization control in serverless functions

34
Comments
4 min read
Adding a Privacy Layer to AWS PartyRock

Adding a Privacy Layer to AWS PartyRock

10
Comments
9 min read
Convert your WordPress site to static HTML with wget

Convert your WordPress site to static HTML with wget

Comments
2 min read
IP Address

IP Address

18
Comments 3
4 min read
Uncovering thousands of unique secrets in PyPI packages

Uncovering thousands of unique secrets in PyPI packages

5
Comments
10 min read
Enhancing Data Security with Column-Level Encryption: Best Practices

Enhancing Data Security with Column-Level Encryption: Best Practices

1
Comments
5 min read
Nasty local privilege escalation on Linux Looney Tunables

Nasty local privilege escalation on Linux Looney Tunables

3
Comments
2 min read
📜 RepoList - A tool to generate wordlists based on GitHub repositories

📜 RepoList - A tool to generate wordlists based on GitHub repositories

8
Comments 1
3 min read
Online Robots.txt Validator For Creating a Secure Robots.txt

Online Robots.txt Validator For Creating a Secure Robots.txt

2
Comments
3 min read
📌 Azure Landing Zone baseline

📌 Azure Landing Zone baseline

6
Comments
2 min read
We built GPT Bot focused on API Security

We built GPT Bot focused on API Security

Comments
2 min read
Cyber Security Analyst vs. Cyber Security Specialist

Cyber Security Analyst vs. Cyber Security Specialist

5
Comments
4 min read
Security Workshop Part 1 - Put up a gate

Security Workshop Part 1 - Put up a gate

Comments
5 min read
Digital certificates And PKI

Digital certificates And PKI

Comments
5 min read
🎆Party Time: Your Security Supporters with PartyRock

🎆Party Time: Your Security Supporters with PartyRock

10
Comments
3 min read
Authentication and Authorization: A comprehensive guide

Authentication and Authorization: A comprehensive guide

5
Comments
10 min read
Passwords vs Keys

Passwords vs Keys

2
Comments
2 min read
HasMySecretLeaked - Building a Trustless and Secure Protocol

HasMySecretLeaked - Building a Trustless and Secure Protocol

12
Comments
8 min read
Build a Cybersecurity Link-Analyzer with Go

Build a Cybersecurity Link-Analyzer with Go

1
Comments 2
4 min read
Introducing agentless API discovery & inventory - Congrats to our tech team!

Introducing agentless API discovery & inventory - Congrats to our tech team!

5
Comments
1 min read
Writing secure code for web applications🔓

Writing secure code for web applications🔓

Comments
4 min read
Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Comments
4 min read
Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

2
Comments 2
4 min read
SQL Injections at Work

SQL Injections at Work

1
Comments
4 min read
Web Application Security 101

Web Application Security 101

2
Comments
1 min read
Subnetting

Subnetting

13
Comments 2
3 min read
Secure Connection between Lambda and RDS: Choosing and Implementing SSL/TLS Certificates

Secure Connection between Lambda and RDS: Choosing and Implementing SSL/TLS Certificates

7
Comments
2 min read
Como identificar vulnerabilidades no código fonte?

Como identificar vulnerabilidades no código fonte?

17
Comments 2
8 min read
Navigating the JavaScript Frontier with is.primitive and is.not_primitive from 'thiis'

Navigating the JavaScript Frontier with is.primitive and is.not_primitive from 'thiis'

5
Comments 1
3 min read
Extensive Guide to Gnu Privacy Guard (GPG)

Extensive Guide to Gnu Privacy Guard (GPG)

1
Comments
10 min read
loading...