DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Adding an outbox, mail, tokens, CSRF, and more

Adding an outbox, mail, tokens, CSRF, and more

Comments
6 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Understanding Proxy IP Reputation and Why It Affects Your Success Rate

Understanding Proxy IP Reputation and Why It Affects Your Success Rate

1
Comments
2 min read
Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

2
Comments
4 min read
Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Comments
13 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
Safer Pushes, SIEM Webhooks, and Verifiable Releases

Safer Pushes, SIEM Webhooks, and Verifiable Releases

1
Comments
3 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

2
Comments
2 min read
How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

Comments
3 min read
Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

1
Comments
5 min read
Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Comments
5 min read
How to Secure Your App Using OAuth2 with Ory Hydra

How to Secure Your App Using OAuth2 with Ory Hydra

1
Comments
2 min read
Is Your Email Already Compromised? How to Check in 30 Seconds

Is Your Email Already Compromised? How to Check in 30 Seconds

2
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.