DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

Comments
3 min read
Day 2 — Phishing & Identity Verification (The Typed Letter)

Day 2 — Phishing & Identity Verification (The Typed Letter)

6
Comments
2 min read
Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment

Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment

3
Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
Dirty COW exploit that broke linux in 2016

Dirty COW exploit that broke linux in 2016

Comments
2 min read
CVE-2025-55182 (React2Shell)

CVE-2025-55182 (React2Shell)

Comments
23 min read
🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

Comments
4 min read
Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

1
Comments
16 min read
MVP Conf 2025 - OWASP API Security Top 10

MVP Conf 2025 - OWASP API Security Top 10

Comments
3 min read
I Was Given a “Job Assignment” That Installed Malware

I Was Given a “Job Assignment” That Installed Malware

3
Comments
2 min read
WHAT IS A SECRET?

WHAT IS A SECRET?

6
Comments
6 min read
JWT Token Validator Challenge

JWT Token Validator Challenge

2
Comments
8 min read
Security-First WebSockets: Protecting Real-Time Communications

Security-First WebSockets: Protecting Real-Time Communications

3
Comments 2
2 min read
eBPF Tutorial: Privilege Escalation via File Content Manipulation

eBPF Tutorial: Privilege Escalation via File Content Manipulation

Comments
7 min read
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.