DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 17 — Silent Failure & Loss of Visibility (The White Tree)

Day 17 — Silent Failure & Loss of Visibility (The White Tree)

3
Comments
2 min read
Is Shopify Legitimate or a Scam? A Practical Guide for Developers and Indie Founders

Is Shopify Legitimate or a Scam? A Practical Guide for Developers and Indie Founders

Comments
3 min read
Thoughts on zero-knowledge password managers

Thoughts on zero-knowledge password managers

Comments
1 min read
What Your Flutter App Leaks After Release (And How to Catch It Before Launch)

What Your Flutter App Leaks After Release (And How to Catch It Before Launch)

Comments
2 min read
PyTorch Models Are Executables: Why I Built a Scanner to Stop "Pickle Bombs"

PyTorch Models Are Executables: Why I Built a Scanner to Stop "Pickle Bombs"

Comments
3 min read
Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment

Mastering Cloud Security: A Strategic Guide to Securing Your AWS Environment

1
Comments
4 min read
Bypass WiFi Time Limits on Your Mac: One Command to Reset Your MAC Address

Bypass WiFi Time Limits on Your Mac: One Command to Reset Your MAC Address

Comments
4 min read
This message will self-destruct in 5 seconds...

This message will self-destruct in 5 seconds...

Comments
6 min read
How to Create a Chatbot That Processes Credit Card Applications

How to Create a Chatbot That Processes Credit Card Applications

Comments
12 min read
Part 02: Building a Sovereign Software Factory: The Local Root CA & Trust Chains

Part 02: Building a Sovereign Software Factory: The Local Root CA & Trust Chains

Comments
31 min read
Spring Boot Security tokens Validation locally using Keycloak’s public keys (JWKS)

Spring Boot Security tokens Validation locally using Keycloak’s public keys (JWKS)

Comments
6 min read
Day 16 — Authentication Between Services (The Dragon-Archer's Question)

Day 16 — Authentication Between Services (The Dragon-Archer's Question)

3
Comments
2 min read
Splunk Basics

Splunk Basics

1
Comments
4 min read
The Gap Between Compliance-Driven Pentesting and Real Security

The Gap Between Compliance-Driven Pentesting and Real Security

2
Comments
5 min read
🔐 Week 4 Scripting Challenge: Build an Auth Log Failed Login Scraper in Python

🔐 Week 4 Scripting Challenge: Build an Auth Log Failed Login Scraper in Python

3
Comments 2
12 min read
Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Comments
2 min read
Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Comments
3 min read
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

Comments
7 min read
Tutorial: How to Detect VPNs and Tor Users in Node.js Express

Tutorial: How to Detect VPNs and Tor Users in Node.js Express

Comments
3 min read
Form Security Best Practices: Protecting Your Web Forms from Attacks

Form Security Best Practices: Protecting Your Web Forms from Attacks

Comments
14 min read
When a seemingly innoffensive conversation with AI turns malicious

When a seemingly innoffensive conversation with AI turns malicious

Comments
2 min read
Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Comments
5 min read
Chatbot Rate Limiting: Prevent Abuse and Save Costs

Chatbot Rate Limiting: Prevent Abuse and Save Costs

Comments
12 min read
Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear

Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear

Comments 1
4 min read
Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites

Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites

Comments
2 min read
loading...