DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 20th June 2025

Security news weekly round-up - 20th June 2025

1
Comments
5 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

2
Comments 1
4 min read
Secure .NET App with Google Authentication (Step-by-Step)

Secure .NET App with Google Authentication (Step-by-Step)

1
Comments
4 min read
Flutter Security: Top Best Practices

Flutter Security: Top Best Practices

Comments
6 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
What’s Happening Inside Your Linux Kernel?

What’s Happening Inside Your Linux Kernel?

6
Comments
4 min read
Secure CI/CD 2025: How I Harden GitLab at Scale

Secure CI/CD 2025: How I Harden GitLab at Scale

Comments
1 min read
Day 11 : FastAPI Auth: Login with JWT & Route Protection

Day 11 : FastAPI Auth: Login with JWT & Route Protection

2
Comments
6 min read
Specter-AAL

Specter-AAL

3
Comments
2 min read
Real-Time API Token Leak Detection & Response with Python

Real-Time API Token Leak Detection & Response with Python

Comments
1 min read
Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Comments
3 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
WordPress Roles & Capabilities: A Practical Guide

WordPress Roles & Capabilities: A Practical Guide

Comments
1 min read
Handling password-protected PDFs in Javascript

Handling password-protected PDFs in Javascript

1
Comments
6 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
Secure Your Node.js API Like a Bank Vault

Secure Your Node.js API Like a Bank Vault

Comments
2 min read
Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Comments
1 min read
5-Layer Windows Registry Anomaly Detection Using Python

5-Layer Windows Registry Anomaly Detection Using Python

Comments
1 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

1
Comments
3 min read
Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Comments
2 min read
Why Developers Seek an Auth0 Alternative

Why Developers Seek an Auth0 Alternative

Comments
2 min read
AWS re:Inforce 2025 keynote highlights

AWS re:Inforce 2025 keynote highlights

5
Comments
9 min read
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

Comments
10 min read
loading...