DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Vector Database Security Risk Assessment: Enterprise Framework

Vector Database Security Risk Assessment: Enterprise Framework

Comments
4 min read
Vector Database Breaches: How Embeddings Expose Your Sensitive Data

Vector Database Breaches: How Embeddings Expose Your Sensitive Data

1
Comments
5 min read
TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

Comments
3 min read
Supply Chain Attacks: How Compromised Dependencies Weaponize Your Entire AI Infrastructure

Supply Chain Attacks: How Compromised Dependencies Weaponize Your Entire AI Infrastructure

Comments
11 min read
Linxr | Part 2 — Shipping QEMU in an APK

Linxr | Part 2 — Shipping QEMU in an APK

1
Comments
3 min read
Enterprise API Leakage: Why ChatGPT Enterprise, Claude API, and Gemini Aren't Actually Private

Enterprise API Leakage: Why ChatGPT Enterprise, Claude API, and Gemini Aren't Actually Private

Comments
7 min read
Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows

Review: Cloudflare Endpoint-to-Prompt Data Security Guardrails for Drupal and WordPress AI Coding Workflows

Comments
3 min read
5 Ways to Debug JWT Tokens (Without Losing Your Mind)

5 Ways to Debug JWT Tokens (Without Losing Your Mind)

Comments
3 min read
Should You Pay That AI Agent? Add a Trust Check in 3 Lines

Should You Pay That AI Agent? Add a Trust Check in 3 Lines

Comments
3 min read
Why Supply Chain Security Fails in the Real World

Why Supply Chain Security Fails in the Real World

Comments
7 min read
PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

1
Comments
3 min read
The Agent That Went Rogue: What Happened and How I Fixed It

The Agent That Went Rogue: What Happened and How I Fixed It

Comments
4 min read
Day 14: Linux Local Privilege Escalation — The Auditor's Roadmap 🕵️‍♂️

Day 14: Linux Local Privilege Escalation — The Auditor's Roadmap 🕵️‍♂️

Comments
1 min read
Designing Blockchain Systems: What Smart Contract Tutorials Don't Tell You (Part 1)

Designing Blockchain Systems: What Smart Contract Tutorials Don't Tell You (Part 1)

2
Comments
6 min read
TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.