DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Android Biometric Auth & ProGuard R8 — Security Best Practices

Android Biometric Auth & ProGuard R8 — Security Best Practices

Comments
3 min read
My Experience: Conditional Access policies

My Experience: Conditional Access policies

1
Comments
2 min read
Android Runtime Permissions in 2026: Camera, Location, and Notifications

Android Runtime Permissions in 2026: Camera, Location, and Notifications

Comments
4 min read
CVE-2026-28415: Open Redirect in Gradio OAuth Flow Enables Phishing Attacks

CVE-2026-28415: Open Redirect in Gradio OAuth Flow Enables Phishing Attacks

Comments
2 min read
When Exchanges Go Dark: Implementing VCP v1.1 Cryptographic Audit Trails for Algorithmic Trading Disruptions

When Exchanges Go Dark: Implementing VCP v1.1 Cryptographic Audit Trails for Algorithmic Trading Disruptions

6
Comments
21 min read
AI Agent Security: The Threat Model Nobody Talks About

AI Agent Security: The Threat Model Nobody Talks About

1
Comments 2
8 min read
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions

Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions

1
Comments
7 min read
JWT Explained for Beginners — With Simple Math Analogies

JWT Explained for Beginners — With Simple Math Analogies

1
Comments
3 min read
A native Windows SSH agent using CNG/KSP, with no dependencies, smartcard support, and full RDP compatibility

A native Windows SSH agent using CNG/KSP, with no dependencies, smartcard support, and full RDP compatibility

1
Comments
3 min read
How MCP Servers Get Hacked - And How to Scan for It

How MCP Servers Get Hacked - And How to Scan for It

Comments
7 min read
Give Your AI Agent a Cryptographic Identity — Hello World in 5 Minutes

Give Your AI Agent a Cryptographic Identity — Hello World in 5 Minutes

Comments
3 min read
How Enterprise AI Platforms Get Hacked: Lessons from the McKinsey Lilli Breach

How Enterprise AI Platforms Get Hacked: Lessons from the McKinsey Lilli Breach

1
Comments
6 min read
Section 230's Co-Author Just Said AI Outputs Aren't Protected. Here's How to Build the Proof That Matters.

Section 230's Co-Author Just Said AI Outputs Aren't Protected. Here's How to Build the Proof That Matters.

Comments
22 min read
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Comments
2 min read
OptiLeak: Efficient Prompt Reconstruction via Reinforcement Learning in Multi-tenant LLM Services

OptiLeak: Efficient Prompt Reconstruction via Reinforcement Learning in Multi-tenant LLM Services

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.