DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Agentic testing for prompt leakage security

Agentic testing for prompt leakage security

25
Comments
8 min read
How to get into your CMS when you've locked the keys in your car.

How to get into your CMS when you've locked the keys in your car.

1
Comments
2 min read
Understanding DevSecOps Principles

Understanding DevSecOps Principles

1
Comments
6 min read
OAuth2 and PKCE: Enhancing Security for Public Clients

OAuth2 and PKCE: Enhancing Security for Public Clients

Comments
3 min read
OS Security & Encryption: Protect Your Data Like a Pro! 🔐

OS Security & Encryption: Protect Your Data Like a Pro! 🔐

Comments
2 min read
Zero Downtime migration of API Authentication

Zero Downtime migration of API Authentication

Comments
4 min read
Adding Developer Portal Access and Request Validation to a Firestore API

Adding Developer Portal Access and Request Validation to a Firestore API

Comments
7 min read
Why Zuplo Has the Best Damn Rate Limiter on the Planet

Why Zuplo Has the Best Damn Rate Limiter on the Planet

Comments
2 min read
Rebuttal: API keys can do everything

Rebuttal: API keys can do everything

Comments
7 min read
Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Comments
4 min read
Day 1 - Introducing the ZAPI Management API

Day 1 - Introducing the ZAPI Management API

Comments
3 min read
Using PropelAuth to secure your API at the Gateway

Using PropelAuth to secure your API at the Gateway

Comments
3 min read
User-level auth in your Supabase API - Supaweek Day 2

User-level auth in your Supabase API - Supaweek Day 2

Comments
4 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
Integrating Clerk With Zuplo For Seamless API Authentication

Integrating Clerk With Zuplo For Seamless API Authentication

Comments
6 min read
Day 5 - Announcing v2 of react-api-key-manager

Day 5 - Announcing v2 of react-api-key-manager

Comments
1 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
Adding API Key Authentication to a Firestore API

Adding API Key Authentication to a Firestore API

Comments
12 min read
Simple HTTP Authentication: A Beginner’s Guide

Simple HTTP Authentication: A Beginner’s Guide

Comments
9 min read
Tips and Best Practices for API Authentication

Tips and Best Practices for API Authentication

Comments
10 min read
Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Comments
7 min read
Build a Virtual Private Cloud

Build a Virtual Private Cloud

Comments
1 min read
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Comments
9 min read
Understanding and Implementing Content Security Policy (CSP) in Laravel

Understanding and Implementing Content Security Policy (CSP) in Laravel

Comments 1
4 min read
How to Download and Install FortiClient VPN for Your Windows PC

How to Download and Install FortiClient VPN for Your Windows PC

1
Comments
1 min read
How to evaluate the safety and security of LLM Applications?

How to evaluate the safety and security of LLM Applications?

Comments
1 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Comments
4 min read
How to Recover Access to BitLocker After Losing Your Password? 🔐

How to Recover Access to BitLocker After Losing Your Password? 🔐

Comments
2 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

6
Comments
2 min read
Why Security Testing is a Must-Have for Fintech Success

Why Security Testing is a Must-Have for Fintech Success

Comments
4 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Architecture visible

Architecture visible

Comments
2 min read
𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

5
Comments
2 min read
Password Hashing in Python

Password Hashing in Python

Comments
1 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
Your rich text could be a cross-site scripting vulnerability

Your rich text could be a cross-site scripting vulnerability

Comments
8 min read
Protect Your API Gateway with AWS WAF using CDK

Protect Your API Gateway with AWS WAF using CDK

Comments
5 min read
Azure OpenAI vs OpenAI

Azure OpenAI vs OpenAI

Comments
2 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
⚖️ The Importance of Using ReentrancyGuard in Solidity Smart Contract

⚖️ The Importance of Using ReentrancyGuard in Solidity Smart Contract

Comments
3 min read
Formal Verification: An Example

Formal Verification: An Example

Comments
5 min read
Extortion Pack

Extortion Pack

Comments 1
9 min read
Protecting API Requests Using Nonce, Redis, and Time-Based Validation

Protecting API Requests Using Nonce, Redis, and Time-Based Validation

2
Comments
5 min read
How to Securely Deploy Node App to Ubuntu Server

How to Securely Deploy Node App to Ubuntu Server

1
Comments
11 min read
Building a Security System, with motion detection and time based settings using Arduino

Building a Security System, with motion detection and time based settings using Arduino

Comments
4 min read
Security news weekly round-up - 13th December 2024

Security news weekly round-up - 13th December 2024

Comments
3 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
Understanding Unique Keys in SQL: Ensuring Data Integrity

Understanding Unique Keys in SQL: Ensuring Data Integrity

Comments
2 min read
Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Comments
7 min read
How to scan a port and import the results using Metasploitable and Kali Linux

How to scan a port and import the results using Metasploitable and Kali Linux

Comments
2 min read
HTTPS for Django Development Environment

HTTPS for Django Development Environment

Comments
5 min read
loading...