DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Avoid Getting Blocked While Web Scraping

How to Avoid Getting Blocked While Web Scraping

2
Comments
5 min read
AI Vendor Safety Policies Just Became an Engineering Team's Problem

AI Vendor Safety Policies Just Became an Engineering Team's Problem

1
Comments
7 min read
RoundCube Email Zero-Days: Why Webmail Is Suddenly High-Risk

RoundCube Email Zero-Days: Why Webmail Is Suddenly High-Risk

Comments
6 min read
CVE-2026-27577: n8n RCE: When 'Do Not Enter' is Just a Suggestion

CVE-2026-27577: n8n RCE: When 'Do Not Enter' is Just a Suggestion

Comments
2 min read
The Axios Attack Proved Vibe Coding's Biggest Blind Spot

The Axios Attack Proved Vibe Coding's Biggest Blind Spot

Comments
6 min read
Getting Started with AgentBouncr: Add Governance to Your AI Agent in 5 Minutes

Getting Started with AgentBouncr: Add Governance to Your AI Agent in 5 Minutes

Comments
5 min read
Security Is a Myth | The Axios Supply Chain Attack

Security Is a Myth | The Axios Supply Chain Attack

3
Comments
5 min read
I built a self-hosted code execution runtime (because I needed one)

I built a self-hosted code execution runtime (because I needed one)

Comments
2 min read
I Spent 4 Years Running HashiCorp Vault in Banks. Here's What It Can't Do.

I Spent 4 Years Running HashiCorp Vault in Banks. Here's What It Can't Do.

1
Comments
6 min read
That GitHub Repo Could Be a Backdoor — How Attackers Target Developers Through Fake Projects

That GitHub Repo Could Be a Backdoor — How Attackers Target Developers Through Fake Projects

Comments
3 min read
We built an AI-powered "Time Traveler" to find API keys leaked in your Git history. Meet LeakHunterX.

We built an AI-powered "Time Traveler" to find API keys leaked in your Git history. Meet LeakHunterX.

Comments 4
2 min read
My Experience: Conditional Access policies

My Experience: Conditional Access policies

1
Comments
2 min read
My Experience: Managed identities implementation

My Experience: Managed identities implementation

1
Comments
2 min read
Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain

Lazarus Group Medusa Ransomware: APT38 Multi-Stage Attack Chain

Comments
5 min read
What a “Development Session Proof” Workflow Looks Like with SessionAttested

What a “Development Session Proof” Workflow Looks Like with SessionAttested

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.