DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Coding guidelines

Secure Coding guidelines

Comments
4 min read
Por que criptografar senhas é fundamental no desenvolvimento de software?

Por que criptografar senhas é fundamental no desenvolvimento de software?

Comments
3 min read
Commix: Your New Secret Weapon for Command Injection Vulnerability Hunting

Commix: Your New Secret Weapon for Command Injection Vulnerability Hunting

Comments
2 min read
Android Security Misconfigurations: Key Findings and Recommendations for Clients

Android Security Misconfigurations: Key Findings and Recommendations for Clients

Comments
3 min read
Stop Leaking Your Secrets! Secure Your Node.js Environment Variables.

Stop Leaking Your Secrets! Secure Your Node.js Environment Variables.

1
Comments
3 min read
Kubernetes Security Tools: 7 New Platforms for Container Runtime Protection That Actually Work in Production

Kubernetes Security Tools: 7 New Platforms for Container Runtime Protection That Actually Work in Production

Comments
8 min read
Outil de Cybersécurité du Jour - Aug 30, 2025

Outil de Cybersécurité du Jour - Aug 30, 2025

Comments
3 min read
Critical Vulneribilty on Docker Desktop

Critical Vulneribilty on Docker Desktop

Comments
1 min read
Stealth Mode for Smart Factories: Protecting Machine Code with Adaptive AI

Stealth Mode for Smart Factories: Protecting Machine Code with Adaptive AI

3
Comments
2 min read
WTF is End-to-End Encryption?

WTF is End-to-End Encryption?

1
Comments
3 min read
Democratizing Financial Watchdogs: AI for the Rest of Us

Democratizing Financial Watchdogs: AI for the Rest of Us

Comments
2 min read
Docker Series: Episode 12 — Docker Security — Protect Your Images, Containers & Secrets 🔒

Docker Series: Episode 12 — Docker Security — Protect Your Images, Containers & Secrets 🔒

7
Comments
2 min read
LSASS Memory Dumping Using Native Windows APIs

LSASS Memory Dumping Using Native Windows APIs

Comments
4 min read
Google Cloud Model Armor - LLMs Protection

Google Cloud Model Armor - LLMs Protection

5
Comments
3 min read
Introducing Apollo, Setting a New Record in Voice Deepfake Detection Accuracy

Introducing Apollo, Setting a New Record in Voice Deepfake Detection Accuracy

Comments
4 min read
Hello Everyone

Hello Everyone

Comments
1 min read
Criando um malware em Rust 🦀

Criando um malware em Rust 🦀

2
Comments
10 min read
Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

1
Comments
2 min read
Cloud Misconfigurations: The Hidden Door Hackers Love

Cloud Misconfigurations: The Hidden Door Hackers Love

Comments
3 min read
3 Gotchas When Calling an IAP‑Protected Cloud Run API from a Chrome Extension (MV3)

3 Gotchas When Calling an IAP‑Protected Cloud Run API from a Chrome Extension (MV3)

7
Comments 2
3 min read
Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

7
Comments
2 min read
What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

3
Comments 2
4 min read
Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Comments
4 min read
Stronger iPhone Security for Crypto Transactions

Stronger iPhone Security for Crypto Transactions

6
Comments
1 min read
Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

1
Comments
4 min read
loading...