DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Built My Own Auth Server Instead of Reusing Firebase — Here’s What I Learned

I Built My Own Auth Server Instead of Reusing Firebase — Here’s What I Learned

1
Comments
2 min read
Understanding Prompt Injection Attacks

Understanding Prompt Injection Attacks

1
Comments
5 min read
Rahsi Security State Sovereignty™ | From Tools to Truth: The Five States You Must Control

Rahsi Security State Sovereignty™ | From Tools to Truth: The Five States You Must Control

Comments
2 min read
jwt-encde: A simple way to handle JWTs on your desktop

jwt-encde: A simple way to handle JWTs on your desktop

3
Comments
1 min read
AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments

AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments

6
Comments
8 min read
CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

CVE-2026-24061: Telnet Strikes Back: GNU Inetutils Root Authentication Bypass

Comments
2 min read
Memory Safety Guarantees in Rust

Memory Safety Guarantees in Rust

Comments
8 min read
Lambda Durable Functions - Keeping your Payloads Secure

Lambda Durable Functions - Keeping your Payloads Secure

Comments
11 min read
Building a Secure Enterprise Developer Workspace on AWS

Building a Secure Enterprise Developer Workspace on AWS

Comments
9 min read
The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

1
Comments
4 min read
Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Proving What AI Didn't Generate: A Cryptographic Solution to the Grok Crisis

Comments
8 min read
Why My Windows Transparent Proxy Failed on Wi-Fi (and Worked on Ethernet)

Why My Windows Transparent Proxy Failed on Wi-Fi (and Worked on Ethernet)

Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
PVS-Studio, Java and OWASP Top Ten 2021

PVS-Studio, Java and OWASP Top Ten 2021

Comments
1 min read
Time-Decoupled Law (TDSM)

Time-Decoupled Law (TDSM)

Comments
5 min read
API Authentication Best Practices in 2026

API Authentication Best Practices in 2026

Comments
9 min read
PassForgePro: Learning-focused Local-Only Password Manager

PassForgePro: Learning-focused Local-Only Password Manager

1
Comments
2 min read
Authentication Patterns: JWTs, Sessions, and When to Use Each

Authentication Patterns: JWTs, Sessions, and When to Use Each

Comments
2 min read
User Authentication in 2025: Stop Rolling Your Own

User Authentication in 2025: Stop Rolling Your Own

Comments
2 min read
GuardDuty: Your AWS Watchdog

GuardDuty: Your AWS Watchdog

Comments
5 min read
Your Connection is Not Private: What Your Browser Is Warning You About?

Your Connection is Not Private: What Your Browser Is Warning You About?

1
Comments
6 min read
AWS SFTP con AWS Transfer Family y Amazon Cognito

AWS SFTP con AWS Transfer Family y Amazon Cognito

Comments
4 min read
CVE-2025-13465: Lodash: The Delete Button for the Universe (CVE-2025-13465)

CVE-2025-13465: Lodash: The Delete Button for the Universe (CVE-2025-13465)

Comments
2 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
Service Mesh Architecture Patterns with Istio & Envoy

Service Mesh Architecture Patterns with Istio & Envoy

Comments
5 min read
loading...