DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is JWKS? JSON Web Key Set — Short Guide

What is JWKS? JSON Web Key Set — Short Guide

Comments
5 min read
Fraudsters Can't Hide Anymore. Here's How to Spot Them.

Fraudsters Can't Hide Anymore. Here's How to Spot Them.

Comments
4 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
Outil de Cybersécurité du Jour - Aug 14, 2025

Outil de Cybersécurité du Jour - Aug 14, 2025

Comments
2 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

3
Comments
3 min read
Protect Your Environments: Practical Security Tips for Smarter Deployments

Protect Your Environments: Practical Security Tips for Smarter Deployments

Comments
5 min read
RC4: From Ubiquity to Collapse — and What It Taught Us About Trust

RC4: From Ubiquity to Collapse — and What It Taught Us About Trust

3
Comments
4 min read
Introducing WtfCode.dev: Learn from the Worst Code Examples

Introducing WtfCode.dev: Learn from the Worst Code Examples

Comments
3 min read
Security news weekly round-up - 5th September 2025

Security news weekly round-up - 5th September 2025

1
Comments
2 min read
IA e Segurança de Software: Automação ou Novo Vetor de Ataques?

IA e Segurança de Software: Automação ou Novo Vetor de Ataques?

1
Comments
11 min read
Building a Unified AI Safety Platform

Building a Unified AI Safety Platform

Comments
5 min read
🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI

🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI

1
Comments
3 min read
Boosting Network Monitoring with Guardius Ping Task

Boosting Network Monitoring with Guardius Ping Task

Comments
1 min read
Top 5 Web Security Scanners in 2025: Protect Your Digital Assets

Top 5 Web Security Scanners in 2025: Protect Your Digital Assets

1
Comments
3 min read
What Are Game Servers and How Do They Work?

What Are Game Servers and How Do They Work?

Comments
3 min read
Silent Code: The Unseen Algorithms Reshaping Your Digital World

Silent Code: The Unseen Algorithms Reshaping Your Digital World

Comments
2 min read
Implementing Continuous Access Control with OpenID CAEP

Implementing Continuous Access Control with OpenID CAEP

1
Comments
4 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
CAPTCHA provider buyer’s guide 2025

CAPTCHA provider buyer’s guide 2025

Comments
7 min read
Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

1
Comments
4 min read
DNS Spoofing Explained: How Hackers Trick the Internet’s Phonebook

DNS Spoofing Explained: How Hackers Trick the Internet’s Phonebook

16
Comments
3 min read
🐳 Docker Explained with a Food Truck 🍔

🐳 Docker Explained with a Food Truck 🍔

Comments
1 min read
Implementing Passkeys in Large‑Scale Web Applications

Implementing Passkeys in Large‑Scale Web Applications

Comments
6 min read
Advanced Contract Patterns and Testing Strategies for AI-Safe Development

Advanced Contract Patterns and Testing Strategies for AI-Safe Development

Comments
12 min read
loading...