DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI Agents Lost $600K+ to Prompt Injection — Attack Taxonomy & Code-Level Defenses

AI Agents Lost $600K+ to Prompt Injection — Attack Taxonomy & Code-Level Defenses

1
Comments
2 min read
Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint

Navigating the Software-to-Cybersecurity Transition: A Fortune 500 Practitioner's Blueprint

Comments
11 min read
The killer’s signature wasn’t on the weapon, it was in the code.

The killer’s signature wasn’t on the weapon, it was in the code.

1
Comments 3
1 min read
FortiGate Secure Enterprise Network

FortiGate Secure Enterprise Network

1
Comments
3 min read
CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

CVE-2026-0798: Gitea's Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers

Comments
2 min read
CVE-2026-1225: XML Ghosts in the Machine: Configuring Your Way to RCE in Logback

CVE-2026-1225: XML Ghosts in the Machine: Configuring Your Way to RCE in Logback

Comments
2 min read
We Scanned 20 Top MCP Servers for Vulnerabilities — The Results Will Shock You

We Scanned 20 Top MCP Servers for Vulnerabilities — The Results Will Shock You

Comments 1
4 min read
Build Secure, Production-Ready AI Agents with Bifrost’s MCP Gateway

Build Secure, Production-Ready AI Agents with Bifrost’s MCP Gateway

5
Comments
3 min read
Interview Question about Authentication: JWT vs OAuth2 vs SSO

Interview Question about Authentication: JWT vs OAuth2 vs SSO

Comments
5 min read
🔐 MODULE 3: Authentication & Security (Very Important)

🔐 MODULE 3: Authentication & Security (Very Important)

Comments
6 min read
title: The Worst Wi-Fi Security Advice I Found on Facebook 🤦‍♂️ (And Why It's Dangerous)

title: The Worst Wi-Fi Security Advice I Found on Facebook 🤦‍♂️ (And Why It's Dangerous)

2
Comments
2 min read
Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Building Tamper-Evident Audit Trails for Trading Systems: A Complete VCP v1.1 Implementation Guide

Comments
24 min read
CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

CVE-2026-27795: The Chain Breaker: Bypassing LangChain's SSRF Guards

1
Comments
2 min read
From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack

From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack

2
Comments
6 min read
From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive

From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive

2
Comments
12 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.