DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Comments
1 min read
Five ways ngrokkers 'doglab' gateways for homelabs and side projects

Five ways ngrokkers 'doglab' gateways for homelabs and side projects

3
Comments
3 min read
Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

6
Comments
3 min read
The deceptive simplicity of auth

The deceptive simplicity of auth

2
Comments
3 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
Cybr - Beginner's Guide to AWS CloudTrail for Security

Cybr - Beginner's Guide to AWS CloudTrail for Security

Comments
1 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
How Resolve Mixed Content Warnings After Installing SSL

How Resolve Mixed Content Warnings After Installing SSL

1
Comments
5 min read
Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Comments
1 min read
AI Governance in Banking - Key Challenges and Compliance Requirements

AI Governance in Banking - Key Challenges and Compliance Requirements

Comments
5 min read
Why Your CLI Tool Needs OAuth (Not API Keys)

Why Your CLI Tool Needs OAuth (Not API Keys)

Comments
3 min read
VPC Security: Building Fortress-Like Network Architecture

VPC Security: Building Fortress-Like Network Architecture

1
Comments
6 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
Security isn't a feature. It's a mindset.

Security isn't a feature. It's a mindset.

6
Comments
1 min read
Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)

Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)

Comments
10 min read
AiHint Standard - Cryptographic Trust Verification for AI Agents

AiHint Standard - Cryptographic Trust Verification for AI Agents

Comments
4 min read
Connectivity Without Exposure

Connectivity Without Exposure

5
Comments
4 min read
Understanding OAuth 2.0 and OpenID Connect

Understanding OAuth 2.0 and OpenID Connect

Comments
3 min read
Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited

Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited

Comments
1 min read
Recovering Locked S3 Buckets in AWS Organizations using Assume Root

Recovering Locked S3 Buckets in AWS Organizations using Assume Root

2
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 17, 2025

Outil de Cybersécurité du Jour - Aug 17, 2025

1
Comments
3 min read
🎯 Cracking Cyfrin's NFT Challenge: Guessing Pseudo-Randomness Like a Pro

🎯 Cracking Cyfrin's NFT Challenge: Guessing Pseudo-Randomness Like a Pro

1
Comments
7 min read
MCP Vulnerabilities Every Developer Should Know

MCP Vulnerabilities Every Developer Should Know

33
Comments 1
12 min read
Breaking: The Payment API Revolution is Here (and it's passwordless) 🔐

Breaking: The Payment API Revolution is Here (and it's passwordless) 🔐

30
Comments
4 min read
GitHub Repo Security: Your Easy Go-To Checklist

GitHub Repo Security: Your Easy Go-To Checklist

1
Comments
3 min read
loading...