DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
HE WANTED TO MEASURE THE INTERNET, BUT ENDED UP BREAKING IT AND MAKING HISTORY

HE WANTED TO MEASURE THE INTERNET, BUT ENDED UP BREAKING IT AND MAKING HISTORY

1
Comments 1
4 min read
CVE-2026-34247: CVE-2026-34247: Insecure Direct Object Reference and Information Disclosure in WWBN AVideo

CVE-2026-34247: CVE-2026-34247: Insecure Direct Object Reference and Information Disclosure in WWBN AVideo

Comments
2 min read
We Scanned 16 AI Agent Repos. 76% of Tool Calls Had Zero Guards.

We Scanned 16 AI Agent Repos. 76% of Tool Calls Had Zero Guards.

Comments
6 min read
The Mistakes Didn't Change. The Speed Did.

The Mistakes Didn't Change. The Speed Did.

Comments
3 min read
The UK Government Just Called Vibe Coding Security Risks 'Intolerable'

The UK Government Just Called Vibe Coding Security Risks 'Intolerable'

Comments
3 min read
GHSA-H8R8-WCCR-V5F2: GHSA-H8R8-WCCR-V5F2: Mutation-XSS via Re-Contextualization in DOMPurify

GHSA-H8R8-WCCR-V5F2: GHSA-H8R8-WCCR-V5F2: Mutation-XSS via Re-Contextualization in DOMPurify

Comments
2 min read
InformationWeek Says Control AI Agent Costs With Process. Here's Why That Won't Scale.

InformationWeek Says Control AI Agent Costs With Process. Here's Why That Won't Scale.

Comments
7 min read
I built a pre-push git hook that catches leaked secrets before they hit GitHub

I built a pre-push git hook that catches leaked secrets before they hit GitHub

Comments
3 min read
Reducing False Positives: Addressing Non-Exploitable CVEs in Hardened Kubernetes Environments with Vulnerability Scanners

Reducing False Positives: Addressing Non-Exploitable CVEs in Hardened Kubernetes Environments with Vulnerability Scanners

Comments
7 min read
Penetration Testing Basics for Developers

Penetration Testing Basics for Developers

Comments
8 min read
Solving AI Agent Auth: Why Your Bots Need Real Identities

Solving AI Agent Auth: Why Your Bots Need Real Identities

Comments
5 min read
The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

The Math Behind RSA #4: Breaking RSA and the Rise of Elliptic Curve Cryptography

Comments
8 min read
ISO 27001 Just Got the Same Treatment as SOC2

ISO 27001 Just Got the Same Treatment as SOC2

Comments
3 min read
Husband's Loan Application Triggers Security Incident: Third-Party Payroll Access Raises Employer Concerns

Husband's Loan Application Triggers Security Incident: Third-Party Payroll Access Raises Employer Concerns

Comments
7 min read
The AI Audit Pipeline: How ItyFuzz, Certora AI Composer, and Medusa ML Are Making Manual Invariant Discovery Obsolete

The AI Audit Pipeline: How ItyFuzz, Certora AI Composer, and Medusa ML Are Making Manual Invariant Discovery Obsolete

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.