DEV Community

Security

Hopefully not just an afterthought!

Posts

👋Sign infor the ability to sort posts byrelevant,latest,ortop.
Allowing any app on macOS

Allowing any app on macOS

Comments
1 min read
Upgrading Simple Shells to Fully Interactive TTYs

Upgrading Simple Shells to Fully Interactive TTYs

1
Comments
2 min read
Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Comments
2 min read
Introducing the AWS CDK L2 Construct: Simplified Security for Amazon CloudFront with Origin Access Control (OAC)

Introducing the AWS CDK L2 Construct: Simplified Security for Amazon CloudFront with Origin Access Control (OAC)

Comments
3 min read
I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

Comments
1 min read
Kubernetes Custom Resources

Kubernetes Custom Resources

5
Comments
7 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Comments
6 min read
Part 3/3: Advanced Frontend Security Techniques and Tools

Part 3/3: Advanced Frontend Security Techniques and Tools

Comments
2 min read
Web Security in Frontend Development: A 3-Part Series for Developers

Web Security in Frontend Development: A 3-Part Series for Developers

Comments
2 min read
Part 2/3: Practical Steps to Secure Frontend Applications

Part 2/3: Practical Steps to Secure Frontend Applications

Comments
3 min read
A Definitive Guide to API Pentesting by Sekurno

A Definitive Guide to API Pentesting by Sekurno

3
Comments
10 min read
Understanding the different types of SSH Keys

Understanding the different types of SSH Keys

7
Comments
3 min read
Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
Common Website Security Risks and How to Avoid Them

Common Website Security Risks and How to Avoid Them

Comments
5 min read
Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

Comments
3 min read
LINUX CHALLENGE DAY 5

LINUX CHALLENGE DAY 5

Comments 3
1 min read
Implement Unrecognized Device Login Alerts in React

Implement Unrecognized Device Login Alerts in React

Comments
3 min read
Turning Ideas into Art: Texas Animation Studios You Should Know

Turning Ideas into Art: Texas Animation Studios You Should Know

Comments
5 min read
Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Comments
2 min read
SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

Comments
7 min read
How to Use Kubernetes CronJob

How to Use Kubernetes CronJob

5
Comments
6 min read
[2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Debian 12… is amazing! How to: Create your custom codehouse [Part 3B/4]

Debian 12… is amazing! How to: Create your custom codehouse [Part 3B/4]

1
Comments
15 min read
Amazon Simple Storage Service (S3)

Amazon Simple Storage Service (S3)

6
Comments 4
3 min read
Part 1/3: Fundamentals of Web Security in Frontend Development

Part 1/3: Fundamentals of Web Security in Frontend Development

2
Comments
4 min read
Authentication vs. Authorization: Key Differences and Security Risks Explained

Authentication vs. Authorization: Key Differences and Security Risks Explained

Comments
2 min read
Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

2
Comments 1
3 min read
Threat Modeling for Non-Security Experts

Threat Modeling for Non-Security Experts

Comments
5 min read
Issue 70 of AWS Cloud Security Weekly

Issue 70 of AWS Cloud Security Weekly

2
Comments 2
2 min read
Understanding JWT Security Principle

Understanding JWT Security Principle

Comments
2 min read
Schema Validation in Amazon DynamoDB

Schema Validation in Amazon DynamoDB

Comments
2 min read
Security news weekly round-up - 8th November 2024

Security news weekly round-up - 8th November 2024

Comments
4 min read
Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

5
Comments
3 min read
Working with Git Remotes

Working with Git Remotes

7
Comments
6 min read
Security by Design: Building Trust in Blockchain, One Block at a Time

Security by Design: Building Trust in Blockchain, One Block at a Time

Comments
2 min read
Hardware Security Modules: Preparing for the Post-Quantum Era

Hardware Security Modules: Preparing for the Post-Quantum Era

Comments
5 min read
Laravel Application Security

Laravel Application Security

Comments
2 min read
Understanding QR Codes and Choosing the Best QR Code Generators

Understanding QR Codes and Choosing the Best QR Code Generators

1
Comments 1
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Comments
4 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Comments
3 min read
How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
7 firewall management best practices in 2024

7 firewall management best practices in 2024

Comments
4 min read
Understanding Kubernetes Jobs

Understanding Kubernetes Jobs

4
Comments
5 min read
Securing external-dns: Encrypting TXT Registry Records

Securing external-dns: Encrypting TXT Registry Records

Comments
5 min read
Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Comments
3 min read
Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
Git Undo Last Commit

Git Undo Last Commit

4
Comments
4 min read
Deleting Git Commits

Deleting Git Commits

4
Comments
5 min read
What is VPC Flow Log? How to Enable VPC Log

What is VPC Flow Log? How to Enable VPC Log

Comments
2 min read
Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Comments
3 min read
How to Safely Delete Local and Remote Branches in Git

How to Safely Delete Local and Remote Branches in Git

7
Comments 1
5 min read
𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Advanced JWT Exploitation Techniques: Going Beyond the Basics

Advanced JWT Exploitation Techniques: Going Beyond the Basics

Comments
5 min read
What Does a Cyber Security Analyst Do?

What Does a Cyber Security Analyst Do?

Comments
2 min read
Mseal in Linux: An un-hackable solution?

Mseal in Linux: An un-hackable solution?

1
Comments
3 min read
The Human Hack: When Cybercriminals Become Master Manipulators

The Human Hack: When Cybercriminals Become Master Manipulators

Comments
2 min read
Disable password expiration in Windows

Disable password expiration in Windows

Comments
1 min read
loading...