DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
IDMerit's 3 Billion Record Breach: How Your Federal ID Ended Up On The Dark Web

IDMerit's 3 Billion Record Breach: How Your Federal ID Ended Up On The Dark Web

1
Comments
6 min read
Your Law Firm's Data Is Already Exposed: Inside the LexisNexis Cloud Breach That Compromised Federal Judges

Your Law Firm's Data Is Already Exposed: Inside the LexisNexis Cloud Breach That Compromised Federal Judges

Comments
8 min read
GhostLoader: Why Supply Chain Attacks Now Target Your Personal Data

GhostLoader: Why Supply Chain Attacks Now Target Your Personal Data

1
Comments
6 min read
A README File Told My AI Agent to Leak My Secrets. It Worked 85% of the Time.

A README File Told My AI Agent to Leak My Secrets. It Worked 85% of the Time.

1
Comments 1
5 min read
How Mercenary Spyware are Exploiting Android and iOS

How Mercenary Spyware are Exploiting Android and iOS

1
Comments
5 min read
Stop Letting Your AI Agent Forge Human Approval

Stop Letting Your AI Agent Forge Human Approval

2
Comments
2 min read
Stop Shipping Ungoverned AI Code: Your Quick-Start Checklist for Coding Agent Controls

Stop Shipping Ungoverned AI Code: Your Quick-Start Checklist for Coding Agent Controls

Comments
5 min read
The Rollback

The Rollback

1
Comments
5 min read
mcp-colombia Soulprint: Building the First Verified MCP Service

mcp-colombia Soulprint: Building the First Verified MCP Service

Comments
2 min read
CVE-2026-26331: yt-dlp: Downloading Shells Instead of Videos via --netrc-cmd

CVE-2026-26331: yt-dlp: Downloading Shells Instead of Videos via --netrc-cmd

Comments
2 min read
I built an open ZK identity protocol for AI agents — prove you're human without revealing who you are

I built an open ZK identity protocol for AI agents — prove you're human without revealing who you are

Comments
3 min read
6 JavaScript Auth Patterns That Survive the Passkey Era

6 JavaScript Auth Patterns That Survive the Passkey Era

2
Comments
4 min read
How to Test LLM Applications: The Complete Guide to Promptfoo (2026)

How to Test LLM Applications: The Complete Guide to Promptfoo (2026)

1
Comments
10 min read
Puppets and Weapons

Puppets and Weapons

Comments
4 min read
How we built a real-time DNS and VPN leak detection engine (architecture and methodology)

How we built a real-time DNS and VPN leak detection engine (architecture and methodology)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.