DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation

The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation

5
Comments
51 min read
Day 13: Security Best Practices – Locking Down Your PostgreSQL Data

Day 13: Security Best Practices – Locking Down Your PostgreSQL Data

Comments
10 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

1
Comments 2
4 min read
Architecting Resilient Caching in Symfony: Beyond get() and set()

Architecting Resilient Caching in Symfony: Beyond get() and set()

1
Comments
8 min read
Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Comments
2 min read
Hack a Windows System Using PowerShell

Hack a Windows System Using PowerShell

5
Comments
6 min read
Why the MITRE ATT&CK Framework Actually Works

Why the MITRE ATT&CK Framework Actually Works

Comments
6 min read
Validate JSON Using PHP

Validate JSON Using PHP

Comments
2 min read
Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

1
Comments
1 min read
AuthController

AuthController

Comments
2 min read
How I built a hybrid LAN/WAN file sync engine without VPN (and why on-demand sync still matters)

How I built a hybrid LAN/WAN file sync engine without VPN (and why on-demand sync still matters)

1
Comments 1
4 min read
The Poetic Hack: Exploiting LLMs with Verse by Arvind Sundararajan

The Poetic Hack: Exploiting LLMs with Verse by Arvind Sundararajan

Comments
2 min read
TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

Comments
4 min read
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

1
Comments
20 min read
Secure Agent Database Access: Architecture Patterns That Actually Work

Secure Agent Database Access: Architecture Patterns That Actually Work

Comments
15 min read
Data Protection in Blockchain | CCPA Compliance

Data Protection in Blockchain | CCPA Compliance

2
Comments
3 min read
How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

Comments
14 min read
The Bot That Shouldn’t Have Taken Down My Umbraco Site, and the WAF Rule That Fixed It

The Bot That Shouldn’t Have Taken Down My Umbraco Site, and the WAF Rule That Fixed It

2
Comments
4 min read
🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

Comments
1 min read
REMI Superada: evolución tras el Agentic Postgres Challenge

REMI Superada: evolución tras el Agentic Postgres Challenge

Comments 2
1 min read
Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Comments
5 min read
ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

Comments
12 min read
DOKUMEN STANDAR: Laravel Safe Email System

DOKUMEN STANDAR: Laravel Safe Email System

Comments 1
4 min read
Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

Earn Big Through Bug Bounties: A Developer’s Guide to Ethical Hacking

1
Comments
6 min read
Top 5 Container Security Books in 2026

Top 5 Container Security Books in 2026

Comments
3 min read
loading...