DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Azure Backup & Disaster Recovery

Azure Backup & Disaster Recovery

Comments
8 min read
4 Days, 18,599 Lines: What Happens When You Go All-In on Pure C

4 Days, 18,599 Lines: What Happens When You Go All-In on Pure C

Comments
5 min read
AI Agent-Level Attacks & Autonomous Exploit Generation: Can AI Hack Itself?

AI Agent-Level Attacks & Autonomous Exploit Generation: Can AI Hack Itself?

Comments
4 min read
How to Start an RDP Session From macOS With Windows App

How to Start an RDP Session From macOS With Windows App

Comments
4 min read
🚀 Terraform Day 14: Hosting a Secure Static Website with S3 & CloudFront

🚀 Terraform Day 14: Hosting a Secure Static Website with S3 & CloudFront

Comments
2 min read
Security isn’t just about code

Security isn’t just about code

Comments 1
1 min read
How to Turn Cloud "Trash" into a Golden 100GB Encrypted Vault (LVM + rclone)

How to Turn Cloud "Trash" into a Golden 100GB Encrypted Vault (LVM + rclone)

Comments
2 min read
Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Comments
4 min read
I Was Tired of Spam, So I Built My Own Temporary Email System

I Was Tired of Spam, So I Built My Own Temporary Email System

1
Comments 2
7 min read
Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Comments 1
3 min read
When Your Users Are Bots, Not People

When Your Users Are Bots, Not People

Comments
3 min read
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
Day 22 — Chained Attack (The Final Confrontation)

Day 22 — Chained Attack (The Final Confrontation)

3
Comments
2 min read
The Ephemeral Signal Ethics Manifesto

The Ephemeral Signal Ethics Manifesto

Comments
2 min read
Securing IoT Devices Without Agents Using Network-Based Machine Learning

Securing IoT Devices Without Agents Using Network-Based Machine Learning

Comments
11 min read
How Bitcoin Boots Safely

How Bitcoin Boots Safely

Comments
11 min read
AWS simplified Cloudtrail events monitoring using Cloudwatch Logs

AWS simplified Cloudtrail events monitoring using Cloudwatch Logs

Comments
4 min read
Logistics Software Testing: How to Do Quality Assurance for Logistics

Logistics Software Testing: How to Do Quality Assurance for Logistics

Comments
13 min read
The MEV Dark Pool Problem: Why Private Mempools Need Decentralized Verification

The MEV Dark Pool Problem: Why Private Mempools Need Decentralized Verification

Comments 2
4 min read
Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Comments 1
3 min read
AI Code Review for Compliance : Benefits and Best Practices

AI Code Review for Compliance : Benefits and Best Practices

Comments
4 min read
A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫

A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫

Comments
1 min read
I Monkey-Patched Python to Stop AI Agents from Accessing Private Networks

I Monkey-Patched Python to Stop AI Agents from Accessing Private Networks

Comments 1
3 min read
Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Comments
6 min read
Set Up SSO with Auth0 for Seamless App Access and Security

Set Up SSO with Auth0 for Seamless App Access and Security

1
Comments
5 min read
loading...