DEV Community

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
No need to fear the clouds. Play OWASP Cumulus!

No need to fear the clouds. Play OWASP Cumulus!

2
Comments 1
4 min read
Does the AI do the threat modeling of your software?

Does the AI do the threat modeling of your software?

Comments
3 min read
🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

Comments
2 min read
Shadow APIs: Understanding the Risk and 6 Ways to Reduce It

Shadow APIs: Understanding the Risk and 6 Ways to Reduce It

Comments
1 min read
🧠 iOS Reverse Engineering: iOS SQL Injection Challenge

🧠 iOS Reverse Engineering: iOS SQL Injection Challenge

Comments
4 min read
9 Free Web App Vulnerability Scanners You Should Know in 2025

9 Free Web App Vulnerability Scanners You Should Know in 2025

1
Comments
4 min read
OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

7
Comments 1
4 min read
🔴 Chapter 01 – Setting Up a Ruby Environment (Line by Line for Beginners

🔴 Chapter 01 – Setting Up a Ruby Environment (Line by Line for Beginners

Comments
2 min read
Strategic Security: New Features from 3Mór

Strategic Security: New Features from 3Mór

Comments
2 min read
🧠 iOS Reverse Engineering: Defeating Anti-Debug

🧠 iOS Reverse Engineering: Defeating Anti-Debug

1
Comments
4 min read
Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Comments
3 min read
Security is a risk function

Security is a risk function

Comments
1 min read
Login Page for Modern Applications

Login Page for Modern Applications

1
Comments
6 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.