DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Shadow Empire: How Haowang Guarantee Became Telegram's $27 Billion Scam Superhub

The Shadow Empire: How Haowang Guarantee Became Telegram's $27 Billion Scam Superhub

5
Comments
5 min read
Native Libraries in Android: Performance vs Security

Native Libraries in Android: Performance vs Security

Comments
3 min read
Unlocking LLMs: Secure Inference for the Rest of Us

Unlocking LLMs: Secure Inference for the Rest of Us

1
Comments
2 min read
Redis Mastery: Boost Performance with Lua Scripting & Fortify Security

Redis Mastery: Boost Performance with Lua Scripting & Fortify Security

Comments
2 min read
The Largest NPM Supply Chain Attack Ever and How to Defend Against It

The Largest NPM Supply Chain Attack Ever and How to Defend Against It

1
Comments 1
5 min read
CSPM, CIEM, CNAPP: What These Cloud Security Tools Really Do and Why They Matter for You

CSPM, CIEM, CNAPP: What These Cloud Security Tools Really Do and Why They Matter for You

Comments
4 min read
What Are Flash Loans?

What Are Flash Loans?

5
Comments
8 min read
From Weeks to Days: Atome’s Real-Time Feature Engineering with RisingWave

From Weeks to Days: Atome’s Real-Time Feature Engineering with RisingWave

Comments
3 min read
How do you get your dev team to shift left by themselves for real?

How do you get your dev team to shift left by themselves for real?

Comments
6 min read
Outil de Cybersécurité du Jour - Sep 17, 2025

Outil de Cybersécurité du Jour - Sep 17, 2025

1
Comments
3 min read
A New Day, a New Security Attack on npm…

A New Day, a New Security Attack on npm…

Comments
3 min read
The TON Scam Surge: Telegram’s Crypto Revolution Gone Wrong

The TON Scam Surge: Telegram’s Crypto Revolution Gone Wrong

5
Comments
5 min read
How Are You Preparing for AI-Powered Cyber Threats?

How Are You Preparing for AI-Powered Cyber Threats?

Comments
1 min read
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

1
Comments
17 min read
How to use Testcontainers with PostgreSQL and SSL

How to use Testcontainers with PostgreSQL and SSL

Comments
6 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

3
Comments
7 min read
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Comments
2 min read
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

2
Comments
4 min read
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

6
Comments
3 min read
The Silent Thief in Your Code: When AI Assistants Get Hacked

The Silent Thief in Your Code: When AI Assistants Get Hacked

Comments
2 min read
Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

4
Comments
9 min read
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Comments
2 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
loading...