DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

1
Comments
2 min read
Top Security Threats in Blockchain

Top Security Threats in Blockchain

1
Comments
6 min read
Docker Registry (Harbor) and Private Repositories

Docker Registry (Harbor) and Private Repositories

1
Comments
5 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

2
Comments
2 min read
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

Comments
1 min read
BetterAuth Integration with Encore.ts

BetterAuth Integration with Encore.ts

13
Comments
14 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
What is a Prompt Injection Attack

What is a Prompt Injection Attack

1
Comments
2 min read
Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
OWASP Cornucopia 3.0 - A call for card game designers!

OWASP Cornucopia 3.0 - A call for card game designers!

1
Comments
2 min read
The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

Comments
4 min read
Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

1
Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.