DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to pass the OWASP MASVS verification by design
Cover image for How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

4
Comments
6 min read
Running Ollama in a Container Without Internet Access

Running Ollama in a Container Without Internet Access

7
Comments
3 min read
OWASPยฎ Cornucopia Website App 2.1 & Mobile App 1.1!
Cover image for OWASPยฎ Cornucopia Website App 2.1 & Mobile App 1.1!

OWASPยฎ Cornucopia Website App 2.1 & Mobile App 1.1!

7
Comments
5 min read
Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier
Cover image for Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

Detecting Homoglyph Attacks with Toolzrโ€™s Character Identifier

4
Comments
2 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
How to protect your .NET Web API against Common Security Threats
Cover image for How to protect your .NET Web API against Common Security Threats

How to protect your .NET Web API against Common Security Threats

3
Comments
13 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

1
Comments
1 min read
Authentication Flow and symmetric keys
Cover image for Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

1
Comments
2 min read
Quality software = Secure software

Quality software = Secure software

Comments
3 min read
SQL Injection - In Just 5 Minutes!

SQL Injection - In Just 5 Minutes!

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! ๐Ÿ”’๐Ÿ’ป

Comments
1 min read
JWT in Action: Secure Authentication & Authorization in Go
Cover image for JWT in Action: Secure Authentication & Authorization in Go

JWT in Action: Secure Authentication & Authorization in Go

6
Comments
9 min read
Email Verification with Sent Codes in Ruby on Rails without Devise

Email Verification with Sent Codes in Ruby on Rails without Devise

15
Comments 2
5 min read
How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

Comments
7 min read
Daily Quantum Learning #8 - Quantum Annealing

Daily Quantum Learning #8 - Quantum Annealing

1
Comments
2 min read
The Speakeasy Door to Your Network - Port Knocking (2)
Cover image for The Speakeasy Door to Your Network - Port Knocking (2)

The Speakeasy Door to Your Network - Port Knocking (2)

Comments
4 min read
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Why Cloud Security Needs a New Playbook: Introducing CNAMM
Cover image for Why Cloud Security Needs a New Playbook: Introducing CNAMM

Why Cloud Security Needs a New Playbook: Introducing CNAMM

Comments
4 min read
๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

Comments
1 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

1
Comments
4 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
4 min read
How to Run Models Locally: A Step-by-Step Guide for Non-Techies
Cover image for How to Run Models Locally: A Step-by-Step Guide for Non-Techies

How to Run Models Locally: A Step-by-Step Guide for Non-Techies

2
Comments
3 min read
loading...