DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

1
Comments
5 min read
Gadget chains in Java: how unsafe deserialization leads to RCE?

Gadget chains in Java: how unsafe deserialization leads to RCE?

Comments
11 min read
Security news weekly round-up - 10th October 2025

Security news weekly round-up - 10th October 2025

1
Comments
5 min read
AWS Control Tower: Create Your First Landing Zone

AWS Control Tower: Create Your First Landing Zone

Comments
4 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

1
Comments
2 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 โ€“ Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 โ€“ Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

1
Comments
6 min read
Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

2
Comments 1
6 min read
Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Comments
7 min read
The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

Comments
5 min read
Testing HMAC Signatures Online โ€” A Free Developer Tool

Testing HMAC Signatures Online โ€” A Free Developer Tool

Comments
2 min read
Error after Angular version 18 upgrade: Content Security Policy Violation

Error after Angular version 18 upgrade: Content Security Policy Violation

Comments
1 min read
From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App

From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App

6
Comments
5 min read
Iris ID: Pocket-Sized Security, Future-Proof Protection

Iris ID: Pocket-Sized Security, Future-Proof Protection

Comments
2 min read
Google Knows More About You Than You Think

Google Knows More About You Than You Think

Comments
3 min read
Configuring TLS in the Mosquitto MQTT broker

Configuring TLS in the Mosquitto MQTT broker

Comments
4 min read
Secure Your AWS Account: Automate IAM Expiry Notifications with Lambda + SNS

Secure Your AWS Account: Automate IAM Expiry Notifications with Lambda + SNS

Comments
6 min read
GraphQL Security: Protecting Queries and Mutations

GraphQL Security: Protecting Queries and Mutations

Comments
2 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Building Cryptographic Guardrails for AI-Assisted Coding

Building Cryptographic Guardrails for AI-Assisted Coding

1
Comments
3 min read
How to Sanitize PDF Files: Removing Hidden Risks

How to Sanitize PDF Files: Removing Hidden Risks

Comments
2 min read
loading...