DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

10
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

11
Comments
5 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

10
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

10
Comments
4 min read
End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

10
Comments
1 min read
Disable password expiration in Windows

Disable password expiration in Windows

Comments
1 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

11
Comments
4 min read
Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

1
Comments
4 min read
Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

4
Comments 1
3 min read
Strengthening Your Cloud Security with AWS Security & Identity Tools

Strengthening Your Cloud Security with AWS Security & Identity Tools

Comments
3 min read
What is CDR?

What is CDR?

Comments
3 min read
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Comments
1 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

13
Comments 2
4 min read
Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Comments
5 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

10
Comments
5 min read
When to Start Secret Rotation

When to Start Secret Rotation

Comments
2 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

11
Comments
5 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
Unlocking the Secrets of Authentication: A Human's Guide to Digital Security 🔐

Unlocking the Secrets of Authentication: A Human's Guide to Digital Security 🔐

Comments
5 min read
Exploring AWS Networking and Content Delivery Services

Exploring AWS Networking and Content Delivery Services

Comments
3 min read
Wireshark Sniffing: Capturing and Analyzing Network Data Like a Pro

Wireshark Sniffing: Capturing and Analyzing Network Data Like a Pro

1
Comments
3 min read
[SÊrie Auth/Aut] Introduction : l'importance du contrôle d'accès

[SÊrie Auth/Aut] Introduction : l'importance du contrôle d'accès

5
Comments
5 min read
Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

1
Comments
3 min read
Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

4
Comments 4
5 min read
loading...