DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Gave My AI Agent a Brain. Then I Had to Protect It.

I Gave My AI Agent a Brain. Then I Had to Protect It.

Comments
5 min read
Linux Fundamentals - Part 13: File Permissions & Ownership

Linux Fundamentals - Part 13: File Permissions & Ownership

Comments
2 min read
How a Small Config Change Can Silently Break Production (And How to Prevent It Automatically)

How a Small Config Change Can Silently Break Production (And How to Prevent It Automatically)

1
Comments
2 min read
Thiết kế NGFW - Throughput:  40Gbps và WAF-WAF - Throughput: 80Gbps khi bật các tính năng nâng cao dưới On-prem

Thiết kế NGFW - Throughput:  40Gbps và WAF-WAF - Throughput: 80Gbps khi bật các tính năng nâng cao dưới On-prem

Comments
11 min read
CVE-2026-22892: Confused Deputy in the Chatroom: Dissecting CVE-2026-22892

CVE-2026-22892: Confused Deputy in the Chatroom: Dissecting CVE-2026-22892

Comments
2 min read
CVE-2025-33042: Schema to Shell: Unpacking the Apache Avro Code Injection Vulnerability

CVE-2025-33042: Schema to Shell: Unpacking the Apache Avro Code Injection Vulnerability

Comments
2 min read
Browser automation safety for SetupClaw: what to automate, what to keep manual, and how to handle credentials

Browser automation safety for SetupClaw: what to automate, what to keep manual, and how to handle credentials

Comments
4 min read
SVG files are everywhere — icons, logos, illustrations, UI graphics...

SVG files are everywhere — icons, logos, illustrations, UI graphics...

Comments
2 min read
What Open Source Maintainers Miss in Large PRs (And How to Catch It)

What Open Source Maintainers Miss in Large PRs (And How to Catch It)

Comments
4 min read
Best Snyk Alternatives in 2026: Open-Source Dependency Security Tools

Best Snyk Alternatives in 2026: Open-Source Dependency Security Tools

Comments
2 min read
The New Cost of Trust: Why Supply Chains and Identity Now Decide Whether Your Product Survives

The New Cost of Trust: Why Supply Chains and Identity Now Decide Whether Your Product Survives

Comments
5 min read
Email Authentication That Holds Up in the Real World (SPF, DKIM, DMARC — and the messy parts)

Email Authentication That Holds Up in the Real World (SPF, DKIM, DMARC — and the messy parts)

Comments
6 min read
The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

Comments
3 min read
Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Comments
5 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.