DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HTB - Bastion (Windows)

HTB - Bastion (Windows)

1
Comments
1 min read
Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Comments
5 min read
Securing Flutter Apps: Best Practices for Protecting User Data

Securing Flutter Apps: Best Practices for Protecting User Data

6
Comments 2
3 min read
Will Cybercrime Ever Be Unstoppable?

Will Cybercrime Ever Be Unstoppable?

Comments
2 min read
Should I Accept the Term?

Should I Accept the Term?

Comments
2 min read
Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Essential Cybersecurity Practices for Small Businesses Without a Tech Team

Essential Cybersecurity Practices for Small Businesses Without a Tech Team

1
Comments
2 min read
SPF, DKIM, and DMARC Explained Simply (with Infographics)

SPF, DKIM, and DMARC Explained Simply (with Infographics)

Comments 1
1 min read
I Wrote a Kubernetes Security Book. Here's What It's About

I Wrote a Kubernetes Security Book. Here's What It's About

Comments
1 min read
Implementing 2FA under ASP.Net Core

Implementing 2FA under ASP.Net Core

2
Comments
4 min read
🛡️ Kubernetes Pod Security Best Practices: 13 Key Strategies for Hardening Your Workloads

🛡️ Kubernetes Pod Security Best Practices: 13 Key Strategies for Hardening Your Workloads

5
Comments
4 min read
Avoiding Common JWT Pitfalls in React Native Development

Avoiding Common JWT Pitfalls in React Native Development

Comments
2 min read
TraplessPKE — A New Direction for Post-Quantum Cryptography

TraplessPKE — A New Direction for Post-Quantum Cryptography

Comments
2 min read
Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

Securing Your Code with AWS Inspector: A Comprehensive Guide to Code Security Scanning

3
Comments
4 min read
Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Basic Server Hardening for Ubuntu/Debian: SSH Access and Firewall

Comments
3 min read
Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Hardening Básico de Servidor Ubuntu/Debian: Acesso SSH e Firewall

Comments
3 min read
Security news weekly round-up - 8th August 2025

Security news weekly round-up - 8th August 2025

1
Comments
4 min read
💎 ANN: stone_checksums v1.0.2

💎 ANN: stone_checksums v1.0.2

1
Comments
1 min read
How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

5
Comments
3 min read
Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
Recovering Locked S3 Buckets in AWS Organizations using AssumeRoot

Recovering Locked S3 Buckets in AWS Organizations using AssumeRoot

2
Comments
4 min read
Gateway-Oriented Architecture (GOA)

Gateway-Oriented Architecture (GOA)

Comments
3 min read
GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

5
Comments
19 min read
Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Comments
3 min read
loading...