DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Comments
9 min read
Cybersecurity Predictions for 2026

Cybersecurity Predictions for 2026

Comments
4 min read
Hardening Web3: Implementing ML-DSA (Dilithium) Signers in EVM Smart Contract Wallets

Hardening Web3: Implementing ML-DSA (Dilithium) Signers in EVM Smart Contract Wallets

Comments
1 min read
Why HMAC Is the Right Choice for Webhook Security (and Why Spubhi Makes It Simple)

Why HMAC Is the Right Choice for Webhook Security (and Why Spubhi Makes It Simple)

Comments
3 min read
Pickle.loads() Executando Código Arbitrário

Pickle.loads() Executando Código Arbitrário

Comments
2 min read
Secure your AWS credentials on GitHub Actions with OIDC

Secure your AWS credentials on GitHub Actions with OIDC

Comments
3 min read
Automate your Ansible upgrade and migration process

Automate your Ansible upgrade and migration process

Comments
3 min read
I Built secret2.link to Share Secrets Once

I Built secret2.link to Share Secrets Once

Comments
1 min read
The Kill Switch: Emergency Controls for Autonomous Fleets

The Kill Switch: Emergency Controls for Autonomous Fleets

Comments
4 min read
No todo el riesgo en la IA proviene de intenciones maliciosas

No todo el riesgo en la IA proviene de intenciones maliciosas

Comments
1 min read
AWS Security Services: A Conversation Between Engineers

AWS Security Services: A Conversation Between Engineers

Comments
24 min read
🚀 Supercarga la Autenticación en NestJS con Firebase

🚀 Supercarga la Autenticación en NestJS con Firebase

Comments
3 min read
I built a resume builder that can't read your resume

I built a resume builder that can't read your resume

Comments
1 min read
Del concepto a la estructura: continuando el trabajo sobre gobernanza de la IA

Del concepto a la estructura: continuando el trabajo sobre gobernanza de la IA

Comments
1 min read
Why and How to Remove Unused WordPress Plugins Safely

Why and How to Remove Unused WordPress Plugins Safely

Comments
3 min read
Trouble with Test After Introducing django-axes

Trouble with Test After Introducing django-axes

Comments
2 min read
Inside Linux TCP: From Handshake to Reset or Close

Inside Linux TCP: From Handshake to Reset or Close

Comments
1 min read
ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

Comments
4 min read
From Concept to Structure: Continuing the Work on AI Governance

From Concept to Structure: Continuing the Work on AI Governance

Comments
1 min read
Custodial vs Non-Custodial: The Key Architecture Decision for AI Agent Wallets

Custodial vs Non-Custodial: The Key Architecture Decision for AI Agent Wallets

Comments
5 min read
Exploring DID-based authentication for A2A Protocol agents 🔐

Exploring DID-based authentication for A2A Protocol agents 🔐

Comments
6 min read
I built a pre-install security scanner because npm install scared me

I built a pre-install security scanner because npm install scared me

3
Comments
1 min read
JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines

JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines

Comments
3 min read
Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Comments
1 min read
loading...