DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Insecure Direct Object References (IDOR) in Laravel

Insecure Direct Object References (IDOR) in Laravel

Comments
4 min read
How to mitigate a DDoS attack on a small server

How to mitigate a DDoS attack on a small server

Comments
2 min read
Open-Source != Transparency

Open-Source != Transparency

2
Comments
3 min read
Security iOS Apps with OWASP Best Practices for Data Protection

Security iOS Apps with OWASP Best Practices for Data Protection

Comments
5 min read
Introducing Fleek Machines (Early Access): One Click Verified and Private Compute

Introducing Fleek Machines (Early Access): One Click Verified and Private Compute

2
Comments 1
2 min read
php.ini Overview: Boost Performance, Security, and Flexibility

php.ini Overview: Boost Performance, Security, and Flexibility

Comments
2 min read
Day 1 : Daily Notes for #30DayOfFLCode

Day 1 : Daily Notes for #30DayOfFLCode

Comments
2 min read
Web vulnerability bounty rules update

Web vulnerability bounty rules update

Comments
1 min read
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud

Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud

Comments
4 min read
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Comments
2 min read
🔐 Why Your Team Needs Passbolt for Password Management

🔐 Why Your Team Needs Passbolt for Password Management

Comments
1 min read
Reimagining cybersecurity for developers

Reimagining cybersecurity for developers

Comments
6 min read
Setting up your own secure VPN with Amnezia VPN

Setting up your own secure VPN with Amnezia VPN

Comments
3 min read
Why Security Testing is Crucial for Businesses in the USA

Why Security Testing is Crucial for Businesses in the USA

Comments
5 min read
FUTURE OF TECHNOLOGY

FUTURE OF TECHNOLOGY

1
Comments
2 min read
From Vulnerabilities to Vault: How We Stopped Hardcoding Secrets and Started Using Hashicorp Vault

From Vulnerabilities to Vault: How We Stopped Hardcoding Secrets and Started Using Hashicorp Vault

11
Comments
3 min read
What is Cloud Workload Security

What is Cloud Workload Security

Comments
2 min read
AI-Driven Election Security: Safeguarding Democracy in the Digital Age

AI-Driven Election Security: Safeguarding Democracy in the Digital Age

Comments
5 min read
Crypto/Web3 Scammers in LinkedIn 😈

Crypto/Web3 Scammers in LinkedIn 😈

Comments
2 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Cuarta parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Cuarta parte

Comments
5 min read
These Two Tools Helped Me Earn $40K in Bounties

These Two Tools Helped Me Earn $40K in Bounties

Comments
2 min read
AWS AllowList "Update"

AWS AllowList "Update"

1
Comments
2 min read
SSRF Attacks: The Silent Threat Hiding in Your Server

SSRF Attacks: The Silent Threat Hiding in Your Server

Comments
1 min read
Mario Rojas Espino: Liderazgo Ambiental y Desarrollo Sostenible en Guatemala

Mario Rojas Espino: Liderazgo Ambiental y Desarrollo Sostenible en Guatemala

Comments
2 min read
Issue 71 of AWS Cloud Security Weekly

Issue 71 of AWS Cloud Security Weekly

Comments
2 min read
The Essential Features of Modern Physical Security Systems

The Essential Features of Modern Physical Security Systems

Comments
6 min read
Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Comments
2 min read
I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

Comments
1 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Comments
6 min read
Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
Common Website Security Risks and How to Avoid Them

Common Website Security Risks and How to Avoid Them

Comments
5 min read
Implement Unrecognized Device Login Alerts in React

Implement Unrecognized Device Login Alerts in React

Comments
3 min read
LINUX CHALLENGE DAY 5

LINUX CHALLENGE DAY 5

Comments 3
1 min read
Securing CI/CD Pipelines: GitHub Actions vs Jenkins

Securing CI/CD Pipelines: GitHub Actions vs Jenkins

5
Comments
5 min read
Turning Ideas into Art: Texas Animation Studios You Should Know

Turning Ideas into Art: Texas Animation Studios You Should Know

Comments
5 min read
Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Comments
2 min read
SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

Comments
7 min read
How to Use Kubernetes CronJob

How to Use Kubernetes CronJob

5
Comments
6 min read
[2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Understanding the different types of SSH Keys

Understanding the different types of SSH Keys

7
Comments
3 min read
Kubernetes Custom Resources

Kubernetes Custom Resources

6
Comments
7 min read
Authentication vs. Authorization: Key Differences and Security Risks Explained

Authentication vs. Authorization: Key Differences and Security Risks Explained

Comments
2 min read
Threat Modeling for Non-Security Experts

Threat Modeling for Non-Security Experts

Comments
5 min read
Understanding JWT Security Principle

Understanding JWT Security Principle

Comments
2 min read
Schema Validation in Amazon DynamoDB

Schema Validation in Amazon DynamoDB

Comments
2 min read
Security news weekly round-up - 8th November 2024

Security news weekly round-up - 8th November 2024

Comments
4 min read
Working with Git Remotes

Working with Git Remotes

7
Comments
6 min read
Security by Design: Building Trust in Blockchain, One Block at a Time

Security by Design: Building Trust in Blockchain, One Block at a Time

Comments
2 min read
Hardware Security Modules: Preparing for the Post-Quantum Era

Hardware Security Modules: Preparing for the Post-Quantum Era

Comments
5 min read
Laravel Application Security

Laravel Application Security

Comments
2 min read
Understanding QR Codes and Choosing the Best QR Code Generators

Understanding QR Codes and Choosing the Best QR Code Generators

1
Comments 1
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Comments
4 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Comments
3 min read
How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
7 firewall management best practices in 2024

7 firewall management best practices in 2024

Comments
4 min read
Understanding Kubernetes Jobs

Understanding Kubernetes Jobs

4
Comments
5 min read
Securing external-dns: Encrypting TXT Registry Records

Securing external-dns: Encrypting TXT Registry Records

Comments
5 min read
loading...