DEV Community

# security

👋 Sign in for the ability sort posts by top and latest.
Security news weekly round-up - 22nd October 2021

Security news weekly round-up - 22nd October 2021

Reactions 2 Comments 1
4 min read
We're Lacework. We care about security.

We're Lacework. We care about security.

Reactions 9 Comments
2 min read
Bypassing ModSecurity WAF

Bypassing ModSecurity WAF

Reactions 2 Comments
2 min read
Decentralized cloud storage (cheap and secure)

Decentralized cloud storage (cheap and secure)

Reactions 2 Comments
1 min read
Securely erase your hard drive or SSD for free

Securely erase your hard drive or SSD for free

Reactions 5 Comments
5 min read
Stop Your Password From Opening The Door To Hackers

Stop Your Password From Opening The Door To Hackers

Reactions 5 Comments 2
3 min read
Things to know about Phishing attacks

Things to know about Phishing attacks

Reactions 4 Comments
7 min read
Azure SQL : Service Endpoint vs Private Endpoint Part 2

Azure SQL : Service Endpoint vs Private Endpoint Part 2

Reactions 5 Comments
3 min read
Azure SQL : Service Endpoint vs Private Endpoint Part 1

Azure SQL : Service Endpoint vs Private Endpoint Part 1

Reactions 4 Comments
2 min read
Manage Your AWS Secrets With Doppler

Manage Your AWS Secrets With Doppler

Reactions 5 Comments
7 min read
A Detailed Report on SQL INJECTION

A Detailed Report on SQL INJECTION

Reactions 2 Comments
6 min read
E-Commerce Security: Key Threats & Best Practices to Avoid Breaches

E-Commerce Security: Key Threats & Best Practices to Avoid Breaches

Reactions 4 Comments
7 min read
Instalando somente atualizações de segurança no Amazon Linux 2

Instalando somente atualizações de segurança no Amazon Linux 2

Reactions 3 Comments
2 min read
The ultimate guide to GitHub Actions authentication

The ultimate guide to GitHub Actions authentication

Reactions 2 Comments
16 min read
EduRecordApp Lesson 3 (Extending ASPNET Users Table)

EduRecordApp Lesson 3 (Extending ASPNET Users Table)

Reactions 2 Comments
1 min read
Starting your Cloud Security Journey

Starting your Cloud Security Journey

Reactions 3 Comments
6 min read
Ory Developer Conference

Ory Developer Conference

Reactions 2 Comments
1 min read
Level up compliance confidence with AWS Config

Level up compliance confidence with AWS Config

Reactions 5 Comments
3 min read
PSA:The Risks of Remote JDWP Debugging

PSA:The Risks of Remote JDWP Debugging

Reactions 5 Comments
6 min read
AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

AWS SDK: "Unable to locate credentials", a cheat sheet for solving the issue

Reactions 12 Comments
4 min read
Five Benefits of Open Source Software for Your Organization

Five Benefits of Open Source Software for Your Organization

Reactions 8 Comments 2
5 min read
A first update on our salary survey

A first update on our salary survey

Reactions 2 Comments
2 min read
Security news weekly round-up - 1st October 2021

Security news weekly round-up - 1st October 2021

Reactions 2 Comments
3 min read
2021 Hacktoberfest - AppScan CodeSweep for GitHub Live Show

2021 Hacktoberfest - AppScan CodeSweep for GitHub Live Show

Reactions 5 Comments
1 min read
Secure Your Data with AES 256 bit Encryption and Decryption method using PHP

Secure Your Data with AES 256 bit Encryption and Decryption method using PHP

Reactions 9 Comments
1 min read
How to bypass input filter

How to bypass input filter

Reactions 2 Comments
2 min read
Kubernetes Security Checklist 2021

Kubernetes Security Checklist 2021

Reactions 4 Comments
7 min read
Malware Scanning on the Puppet Forge

Malware Scanning on the Puppet Forge

Reactions 2 Comments
5 min read
Security news weekly round-up - 8th October 2021

Security news weekly round-up - 8th October 2021

Reactions 2 Comments
4 min read
Brief ETH Wallet Security Guide

Brief ETH Wallet Security Guide

Reactions 4 Comments
8 min read
Delegating IAM access with permission boundary

Delegating IAM access with permission boundary

Reactions 3 Comments
5 min read
How to Encrypt and Decrypt in Node JS using Crypto

How to Encrypt and Decrypt in Node JS using Crypto

Reactions 5 Comments
1 min read
A Checklist to Quickly Evaluate SaaS Security

A Checklist to Quickly Evaluate SaaS Security

Reactions 3 Comments
4 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

Reactions 3 Comments
4 min read
เก็บตก AWS Gameday Security

เก็บตก AWS Gameday Security

Reactions 6 Comments 2
1 min read
Why detecting generic credentials is a game changer

Why detecting generic credentials is a game changer

Reactions 5 Comments
6 min read
Securing access to Scaleway Elements API Keys from Gitlab CI

Securing access to Scaleway Elements API Keys from Gitlab CI

Reactions 6 Comments
5 min read
Setting-up a Django project for production

Setting-up a Django project for production

Reactions 5 Comments
4 min read
Pentest network python tool

Pentest network python tool

Reactions 3 Comments
1 min read
Let's go CSRF-ing!

Let's go CSRF-ing!

Reactions 6 Comments
13 min read
Web App Security, Understanding the Meaning of the BFF Pattern

Web App Security, Understanding the Meaning of the BFF Pattern

Reactions 153 Comments 2
9 min read
AWS Access Keys - A Reference

AWS Access Keys - A Reference

Reactions 5 Comments
12 min read
Cloud Collective: Real-time Data Integration with Webhooks

Cloud Collective: Real-time Data Integration with Webhooks

Reactions 2 Comments
1 min read
I will be notified if you click this 😈

I will be notified if you click this 😈

Reactions 50 Comments 9
2 min read
Security leaks on our website. How we got hacked?

Security leaks on our website. How we got hacked?

Reactions 5 Comments
7 min read
Kubernetes: Helm  - "x509: certificate signed by unknown authority", and ServiceAccount for Pod

Kubernetes: Helm  - "x509: certificate signed by unknown authority", and ServiceAccount for Pod

Reactions 5 Comments
6 min read
Session management: What it is and why your security depends on it

Session management: What it is and why your security depends on it

Reactions 1 Comments
4 min read
Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

Reactions 2 Comments
4 min read
What is Cybersecurity?

What is Cybersecurity?

Reactions 2 Comments
1 min read
Secure Password Handling in Python

Secure Password Handling in Python

Reactions 18 Comments
9 min read
The ins and outs of JWTs

The ins and outs of JWTs

Reactions 20 Comments
7 min read
Integrating Vercel with Doppler: Sync Secrets in Production

Integrating Vercel with Doppler: Sync Secrets in Production

Reactions 8 Comments
3 min read
Best ways to Connect APIs on the frontend

Best ways to Connect APIs on the frontend

Reactions 138 Comments 1
4 min read
How Android Wallpaper Images Can Threaten Your Privacy

How Android Wallpaper Images Can Threaten Your Privacy

Reactions 24 Comments
6 min read
Data privacy: "We value your privacy" - No you don't

Data privacy: "We value your privacy" - No you don't

Reactions 7 Comments 3
7 min read
Terraform IaC Scanning with Trivy

Terraform IaC Scanning with Trivy

Reactions 15 Comments
5 min read
Mitigating the 0-day Apache path traversal vulnerability

Mitigating the 0-day Apache path traversal vulnerability

Reactions 4 Comments
4 min read
7 Easy-to-Follow Best Practices for Writing Dockerfile

7 Easy-to-Follow Best Practices for Writing Dockerfile

Reactions 126 Comments
6 min read
What are HTTP Security Headers and how to config them?

What are HTTP Security Headers and how to config them?

Reactions 21 Comments 2
7 min read
Computer Vision Startups Enhancing Security & Surveillance

Computer Vision Startups Enhancing Security & Surveillance

Reactions 5 Comments
5 min read
loading...