DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

The Shai-Hulud Worm: How 500+ NPM Packages Became Credential-Stealing Malware

3
Comments
5 min read
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

3
Comments
5 min read
🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations

🛡️ Entendiendo las Service Control Policies (SCPs) en AWS Organizations

2
Comments
11 min read
IRP: The Semantic Model That Fixes AI-Native API Chaos

IRP: The Semantic Model That Fixes AI-Native API Chaos

Comments
2 min read
Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Comments
11 min read
Emergency Server Recovery: A 4-Hour Race Against Time

Emergency Server Recovery: A 4-Hour Race Against Time

Comments
4 min read
Understanding Content Security Policy (CSP)

Understanding Content Security Policy (CSP)

Comments
9 min read
Análise de Vetores de Ataque em Arquitetura de Aplicações Web

Análise de Vetores de Ataque em Arquitetura de Aplicações Web

1
Comments
17 min read
AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

3
Comments
2 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Image Scanning Tools (Anchore, Clair)

Image Scanning Tools (Anchore, Clair)

Comments
6 min read
Cloak of Invisibility: Hiding from AI in Plain Sight

Cloak of Invisibility: Hiding from AI in Plain Sight

Comments
2 min read
Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
AI-Powered Bot Detection Trends 2025: The Future of Web Security

AI-Powered Bot Detection Trends 2025: The Future of Web Security

2
Comments
3 min read
Vibe coding security checklist

Vibe coding security checklist

Comments 1
8 min read
Wallet UX Architecture Decisions: How to Choose the Right Model for Your App

Wallet UX Architecture Decisions: How to Choose the Right Model for Your App

Comments
3 min read
It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

Comments
5 min read
Modern Authentication in 2025: OAuth2, MFA, and the Shift to Passwordless

Modern Authentication in 2025: OAuth2, MFA, and the Shift to Passwordless

Comments
6 min read
Guided Lab: Azure Storage with Customer-Managed Keys, Retention Policies & Encryption Scopes

Guided Lab: Azure Storage with Customer-Managed Keys, Retention Policies & Encryption Scopes

1
Comments
7 min read
Bridging Policy and Automation: Building a Compliant AWS Pipeline in a Regulated Environment

Bridging Policy and Automation: Building a Compliant AWS Pipeline in a Regulated Environment

1
Comments 1
2 min read
I Made a File That's Also Another File (And Your Mind is About to Break) 🤯

I Made a File That's Also Another File (And Your Mind is About to Break) 🤯

4
Comments
6 min read
From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

Comments 1
5 min read
Two Weeks Stuck on Authentication: My Headless API Journey

Two Weeks Stuck on Authentication: My Headless API Journey

1
Comments
2 min read
DevSecOps and Security-First Development Practices

DevSecOps and Security-First Development Practices

Comments
3 min read
Why Teams Need a Bridge Between DAST Tools and Human Pentesters

Why Teams Need a Bridge Between DAST Tools and Human Pentesters

1
Comments
4 min read
loading...