DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 CyberSec Vault: A Curated Cybersecurity Resource Bundle I Wish I Had When Starting Out

🔐 CyberSec Vault: A Curated Cybersecurity Resource Bundle I Wish I Had When Starting Out

Comments
1 min read
Launching ANCP — Secure Login for AI Agents Without VPN or OAuth

Launching ANCP — Secure Login for AI Agents Without VPN or OAuth

Comments
2 min read
Mastering AWS IAM: A Security Professional's Guide

Mastering AWS IAM: A Security Professional's Guide

Comments
3 min read
Understanding CORS: Why Your API Request Failed

Understanding CORS: Why Your API Request Failed

3
Comments
3 min read
🔒 Disable Root SSH Login — Simple Step, Huge Security Win

🔒 Disable Root SSH Login — Simple Step, Huge Security Win

Comments
2 min read
iOS Device Comedy

iOS Device Comedy

1
Comments 5
3 min read
How to Deploy SafeLine WAF on a Hestia Control Panel VPS

How to Deploy SafeLine WAF on a Hestia Control Panel VPS

5
Comments 1
4 min read
Laravel’s Str::mask: Elegant String Masking Made Simple

Laravel’s Str::mask: Elegant String Masking Made Simple

1
Comments 4
2 min read
Security news weekly round-up - 22nd August 2025

Security news weekly round-up - 22nd August 2025

Comments
3 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
What Are Non-Human Identities, and Why Should Security Teams Care?

What Are Non-Human Identities, and Why Should Security Teams Care?

Comments
4 min read
ん, and?

ん, and?

4
Comments
4 min read
The Hidden Security Risk in Your NestJS App: A Validation Story

The Hidden Security Risk in Your NestJS App: A Validation Story

1
Comments
3 min read
Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center

Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center

Comments
2 min read
How to check if your Supabase table is open to public

How to check if your Supabase table is open to public

1
Comments
3 min read
Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

1
Comments 1
3 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Watch Out for These Slash-Like Unicode Characters in Phishing Links

Watch Out for These Slash-Like Unicode Characters in Phishing Links

Comments
2 min read
HTB - Support - Windows (Easy)

HTB - Support - Windows (Easy)

1
Comments
1 min read
AI Scams in 2025: 7 Real Examples and How to Avoid Them

AI Scams in 2025: 7 Real Examples and How to Avoid Them

Comments
3 min read
How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

3
Comments
4 min read
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

1
Comments
6 min read
Snowflake

Snowflake

Comments
1 min read
Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Comments
1 min read
Five ways ngrokkers 'doglab' gateways for homelabs and side projects

Five ways ngrokkers 'doglab' gateways for homelabs and side projects

3
Comments
3 min read
loading...