DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Overlooked Attack Surface in Enterprise RAG Systems

The Overlooked Attack Surface in Enterprise RAG Systems

Comments
2 min read
PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

PKCE Explained: Securing the OAuth 2.0 Authorization Code Flow

4
Comments
3 min read
TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

TLS Fingerprinting: The Bot Detection Method You Cannot Ignore

Comments 1
3 min read
🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

🛡️ Cloud Networking Level 3: The Data Sovereignty Plan

1
Comments
3 min read
Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Comments
10 min read
Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

Sleeper Agents in Your AI Tools: How Backdoored Models Hide Malicious Behaviour Until the Right Moment

2
Comments
5 min read
Security news weekly round-up - 6th February 2026

Security news weekly round-up - 6th February 2026

1
Comments
3 min read
Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store

Securing Serverless Apps: Migrating from Env Vars to AWS SSM Parameter Store

Comments
1 min read
Bridging the Cloud: A Step-by-Step Guide to Azure VNet-to-VNet VPNs

Bridging the Cloud: A Step-by-Step Guide to Azure VNet-to-VNet VPNs

1
Comments
3 min read
Designing a Secure and Scalable AWS Architecture: A Practical Guide

Designing a Secure and Scalable AWS Architecture: A Practical Guide

Comments
2 min read
Password Management - SpringBoot

Password Management - SpringBoot

1
Comments
2 min read
brtc (Brute-force Cost): A CLI Tool to Convert Password Strength into "Time to Crack and a Real USD Invoice"

brtc (Brute-force Cost): A CLI Tool to Convert Password Strength into "Time to Crack and a Real USD Invoice"

1
Comments
6 min read
How to Fix Claude Code's Broken Permissions (With Hooks)

How to Fix Claude Code's Broken Permissions (With Hooks)

Comments 1
3 min read
How Browser Fingerprinting Works

How Browser Fingerprinting Works

Comments
9 min read
What is ESTROLABS?

What is ESTROLABS?

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.