DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why DevOps Teams Overlook Dependency Analysis (and Why You Shouldn’t)

Why DevOps Teams Overlook Dependency Analysis (and Why You Shouldn’t)

1
Comments
2 min read
Advanced Contract Patterns and Testing Strategies for AI-Safe Development

Advanced Contract Patterns and Testing Strategies for AI-Safe Development

Comments
12 min read
Security in CI/CD Pipelines

Security in CI/CD Pipelines

Comments
10 min read
API Security in Django: Approaches, Trade-offs, and Best Practices

API Security in Django: Approaches, Trade-offs, and Best Practices

Comments
6 min read
Bringing Blockchain-Grade Security to IoT and Edge Systems with nanoedge-pki

Bringing Blockchain-Grade Security to IoT and Edge Systems with nanoedge-pki

Comments
4 min read
secure-pubsub-bridge: End-to-End RSA Encryption for Google Cloud Pub/Sub

secure-pubsub-bridge: End-to-End RSA Encryption for Google Cloud Pub/Sub

Comments
2 min read
Are Your VSCode Extensions Safe? The Risk We Don’t Talk About

Are Your VSCode Extensions Safe? The Risk We Don’t Talk About

35
Comments
2 min read
Vibe-Guard is Now a VS Code Extension! And It Just Found 8,000+ Security Issues in a Major Enterprise Project

Vibe-Guard is Now a VS Code Extension! And It Just Found 8,000+ Security Issues in a Major Enterprise Project

1
Comments
4 min read
SentinelMFT: AI-Powered Secure File Transfer & Network Firewall for Google Cloud

SentinelMFT: AI-Powered Secure File Transfer & Network Firewall for Google Cloud

Comments
2 min read
netcryptx: Secure Socket Communication & Encrypted Tunneling for Python

netcryptx: Secure Socket Communication & Encrypted Tunneling for Python

Comments
2 min read
Type-Aware Memory Allocation: The Secret Weapon Against Memory Corruption in iOS

Type-Aware Memory Allocation: The Secret Weapon Against Memory Corruption in iOS

8
Comments 1
4 min read
From Enumeration to Escalation — Basic Pentesting room on TryHackMe

From Enumeration to Escalation — Basic Pentesting room on TryHackMe

Comments
2 min read
How Haowang Used Telegram to Run a $27B Scam Empire for 5 Years

How Haowang Used Telegram to Run a $27B Scam Empire for 5 Years

6
Comments 8
6 min read
Kubernetes Under Siege: Why the API Server and Kubelet Are Hackers Favorite Targets (And How to Protect Them)

Kubernetes Under Siege: Why the API Server and Kubelet Are Hackers Favorite Targets (And How to Protect Them)

1
Comments
3 min read
Hashing and Salting Passwords in C#

Hashing and Salting Passwords in C#

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.