DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 8 — Threat Validation (The Girl in the Red Cloak)

Day 8 — Threat Validation (The Girl in the Red Cloak)

3
Comments
2 min read
Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Crypto-Shredding: How Immutable Audit Logs and GDPR Coexist

Comments
4 min read
Keeping Your Health Data Out of Court

Keeping Your Health Data Out of Court

Comments
4 min read
(7/8) Firewall: Estrutura, Fluxo e Políticas Reais

(7/8) Firewall: Estrutura, Fluxo e Políticas Reais

Comments
4 min read
Without DNS, The Internet Won't Exist

Without DNS, The Internet Won't Exist

6
Comments
8 min read
Introducing Supabomb: Open Source Supabase Penetration Testing

Introducing Supabomb: Open Source Supabase Penetration Testing

1
Comments
8 min read
I Built an Open-Source Privacy Firewall for ChatGPT (Runs 100% Locally)

I Built an Open-Source Privacy Firewall for ChatGPT (Runs 100% Locally)

Comments
4 min read
How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)

How Developers Can Quickly Validate Application Security Before Deployment (2025 Guide)

1
Comments
2 min read
Protecting Seniors from Financial Fraud in the Face of the Local Scam Epidemic

Protecting Seniors from Financial Fraud in the Face of the Local Scam Epidemic

Comments
2 min read
AWS Security Series: AWS Access Key is Compromised. Now What? An Incident Response Playbook.

AWS Security Series: AWS Access Key is Compromised. Now What? An Incident Response Playbook.

Comments
3 min read
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

7
Comments 2
5 min read
Types of Penetration Testing: A Practical Guide for Developers in 2025

Types of Penetration Testing: A Practical Guide for Developers in 2025

Comments
4 min read
Outil de Cybersécurité du Jour - Dec 8, 2025

Outil de Cybersécurité du Jour - Dec 8, 2025

Comments
3 min read
10 Common Supabase Security Misconfigurations (and How to Fix Them)

10 Common Supabase Security Misconfigurations (and How to Fix Them)

1
Comments
6 min read
Outil de Cybersécurité du Jour - Dec 7, 2025

Outil de Cybersécurité du Jour - Dec 7, 2025

Comments
3 min read
React2Shell (CVE-2025-55182): Turns Out, "Server Components" Are Actually Just Remote Code Execution As-A Service

React2Shell (CVE-2025-55182): Turns Out, "Server Components" Are Actually Just Remote Code Execution As-A Service

Comments
4 min read
When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

When RHEL 9 Meets a Legacy Windows Server - A Crypto Policy Story

Comments
4 min read
More Security With Landlock

More Security With Landlock

Comments
3 min read
AIDE Automation Framework From Integrity Checks to Self-Verification

AIDE Automation Framework From Integrity Checks to Self-Verification

1
Comments
4 min read
Security Alert: How to Check for the "Shai-Hulud" Compromise

Security Alert: How to Check for the "Shai-Hulud" Compromise

Comments
2 min read
JWTs Explained: A Beginner’s Guide

JWTs Explained: A Beginner’s Guide

1
Comments
2 min read
VulnFeed 2.0: Building a Zero-Server Vulnerability Dashboard (Level 2 Release)

VulnFeed 2.0: Building a Zero-Server Vulnerability Dashboard (Level 2 Release)

Comments
6 min read
I built a "Paranoid" Data Protocol that runs away from server seizure or censorship (Python + Rust)

I built a "Paranoid" Data Protocol that runs away from server seizure or censorship (Python + Rust)

5
Comments
2 min read
Stop Waiting for a Breach. Let This Open-Source AI Agent Hack You First

Stop Waiting for a Breach. Let This Open-Source AI Agent Hack You First

Comments
2 min read
LogGuard

LogGuard

2
Comments
4 min read
loading...