DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Secure crypto infrastructure: SLSA L3 Provenance for Docker Images - How We Made Our Builds Verifiable

Secure crypto infrastructure: SLSA L3 Provenance for Docker Images - How We Made Our Builds Verifiable

Comments 1
4 min read
Your Agent's Identity Now Belongs to Meta. Here's the Open Alternative.

Your Agent's Identity Now Belongs to Meta. Here's the Open Alternative.

1
Comments
3 min read
The UK Government Just Warned About Vibe Coding Security at RSA. Two Days Later, a Supply Chain Attack Proved Why.

The UK Government Just Warned About Vibe Coding Security at RSA. Two Days Later, a Supply Chain Attack Proved Why.

1
Comments
4 min read
The Third Reason for Edge AI: Law

The Third Reason for Edge AI: Law

Comments
5 min read
EPSS Explained: Why Exploit Prediction Scoring Changes Everything for Vulnerability Prioritization

EPSS Explained: Why Exploit Prediction Scoring Changes Everything for Vulnerability Prioritization

Comments
2 min read
The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins

The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins

Comments
2 min read
How to Securely Store and Use API Keys in Laravel in 2026

How to Securely Store and Use API Keys in Laravel in 2026

1
Comments
3 min read
Google paid me $15,000 for this Prompt Injection bug.

Google paid me $15,000 for this Prompt Injection bug.

1
Comments
3 min read
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

1
Comments
2 min read
Server-Side PDF Encryption with pikepdf in a Next.js App (No qpdf Required)

Server-Side PDF Encryption with pikepdf in a Next.js App (No qpdf Required)

Comments
5 min read
Ditch `authorized_keys` Sprawl: SSH User Certificates with OpenSSH CA (Practical Linux Guide)

Ditch `authorized_keys` Sprawl: SSH User Certificates with OpenSSH CA (Practical Linux Guide)

Comments
4 min read
Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)

Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)

Comments
7 min read
Python 3 & Security: A Deep-Dive Tutorial

Python 3 & Security: A Deep-Dive Tutorial

1
Comments
43 min read
We Built an AML Screening Tool That Replaces $100K Enterprise Contracts

We Built an AML Screening Tool That Replaces $100K Enterprise Contracts

Comments
5 min read
The Terraform State Time Bomb: How to Defuse it Before Your Infra Collapses

The Terraform State Time Bomb: How to Defuse it Before Your Infra Collapses

Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.