DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
We Had Secrets in Kubernetes. Then We Got Audited.

We Had Secrets in Kubernetes. Then We Got Audited.

1
Comments
6 min read
Try asqav in 30 seconds

Try asqav in 30 seconds

Comments
2 min read
From Zero to Hero: Building a Key Issuance Server with `verbose` and `figtree`

From Zero to Hero: Building a Key Issuance Server with `verbose` and `figtree`

Comments
21 min read
GitHub Copilot is Training on Your Code; Opt Out Before April 24 or Lose the Choice

GitHub Copilot is Training on Your Code; Opt Out Before April 24 or Lose the Choice

1
Comments
4 min read
CNAPP pricing teardown: why Indian mid-market rejects Wiz, Orca, and Prisma Cloud (and what they buy instead)

CNAPP pricing teardown: why Indian mid-market rejects Wiz, Orca, and Prisma Cloud (and what they buy instead)

Comments
6 min read
How I Mastered Foundry and Earned My 101 Badge: A Journey into Web3 Security

How I Mastered Foundry and Earned My 101 Badge: A Journey into Web3 Security

Comments
2 min read
MQTT Broker Selection: HiveMQ vs Mosquitto for Industrial Use

MQTT Broker Selection: HiveMQ vs Mosquitto for Industrial Use

1
Comments
4 min read
The Vercel April 2026 Security Incident: What Every Developer Actually Needs to Know

The Vercel April 2026 Security Incident: What Every Developer Actually Needs to Know

Comments
6 min read
The State of Package Health: Weekly Report #002

The State of Package Health: Weekly Report #002

Comments
3 min read
GHSA-JM8C-9F3J-4378: GHSA-jm8c-9f3j-4378: Unauthenticated Email Content Injection in Pretalx Template Engine

GHSA-JM8C-9F3J-4378: GHSA-jm8c-9f3j-4378: Unauthenticated Email Content Injection in Pretalx Template Engine

Comments
2 min read
I Audited 21 Public Vibe-Coded Apps in 48 Hours. Here Are the 5 Patterns That Keep Showing Up.

I Audited 21 Public Vibe-Coded Apps in 48 Hours. Here Are the 5 Patterns That Keep Showing Up.

Comments
6 min read
HTB Lame - NO Metasploit Walkthrough

HTB Lame - NO Metasploit Walkthrough

1
Comments
8 min read
The Negative Proof Problem in AI Governance (Part 1/3)

The Negative Proof Problem in AI Governance (Part 1/3)

Comments
9 min read
CIA Triad, Authentication & Authorization in Cybersecurity (2026)

CIA Triad, Authentication & Authorization in Cybersecurity (2026)

1
Comments 1
12 min read
When Logout is not enough: Defending against Token Theft with Big Tech-grade Rotation.

When Logout is not enough: Defending against Token Theft with Big Tech-grade Rotation.

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.