DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

3
Comments
3 min read
Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)

Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)

Comments
2 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

Comments
1 min read
Beware of Interview Scams!

Beware of Interview Scams!

1
Comments 1
3 min read
Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Comments
6 min read
Hacked Without Touching Your Phone!

Hacked Without Touching Your Phone!

6
Comments
3 min read
Fail-Safe PII Redaction in Elixir

Fail-Safe PII Redaction in Elixir

2
Comments 1
3 min read
What is a WAF? Why and When Do You Need a WAF?

What is a WAF? Why and When Do You Need a WAF?

8
Comments
2 min read
Adding HTTPS to django app on VM(Windows OS) Production level

Adding HTTPS to django app on VM(Windows OS) Production level

Comments
1 min read
How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

Comments
2 min read
EnvShare - A secured, Role-based Access way to share .env file

EnvShare - A secured, Role-based Access way to share .env file

14
Comments 1
2 min read
Lubyc: Your Ultimate AI Business Platform in 2025

Lubyc: Your Ultimate AI Business Platform in 2025

Comments
2 min read
Security news weekly round-up - 25th April 2025

Security news weekly round-up - 25th April 2025

2
Comments
3 min read
Create AES on C/JAVA || Forward S-box (first part)

Create AES on C/JAVA || Forward S-box (first part)

20
Comments 2
4 min read
Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

1
Comments
3 min read
Useful Sites for Privacy and Security

Useful Sites for Privacy and Security

Comments
3 min read
Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Comments
3 min read
Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Comments
2 min read
JWT Tokens: Secure Your APIs Like a Pro

JWT Tokens: Secure Your APIs Like a Pro

3
Comments 3
8 min read
The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

Comments
4 min read
Navigating the Maze: A Guide to Essential Information Security Standards

Navigating the Maze: A Guide to Essential Information Security Standards

Comments
2 min read
How I Use AI Agents Without Compromising Code Quality & Security

How I Use AI Agents Without Compromising Code Quality & Security

2
Comments
2 min read
Application Load Balancer - Drop Invalid Headers

Application Load Balancer - Drop Invalid Headers

7
Comments 3
10 min read
Software Testing - Manual Testing ,Levels,Types

Software Testing - Manual Testing ,Levels,Types

Comments
4 min read
loading...