DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Outil de Cybersécurité du Jour - Sep 17, 2025

Outil de Cybersécurité du Jour - Sep 17, 2025

1
Comments
3 min read
WTH is openFGA and implementing Role-Based Access Control in GO servers.

WTH is openFGA and implementing Role-Based Access Control in GO servers.

11
Comments 1
6 min read
Part 6: Disaster Recovery, Cost Management, and Future-Proofing

Part 6: Disaster Recovery, Cost Management, and Future-Proofing

10
Comments
4 min read
Rethinking Identity Infrastructure for Autonomous Systems

Rethinking Identity Infrastructure for Autonomous Systems

1
Comments
3 min read
The TON Scam Surge: Telegram’s Crypto Revolution Gone Wrong

The TON Scam Surge: Telegram’s Crypto Revolution Gone Wrong

5
Comments
5 min read
How Are You Preparing for AI-Powered Cyber Threats?

How Are You Preparing for AI-Powered Cyber Threats?

Comments
1 min read
AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

9
Comments
3 min read
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

Comments
17 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
How to use Testcontainers with PostgreSQL and SSL

How to use Testcontainers with PostgreSQL and SSL

Comments
6 min read
No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

Comments
7 min read
Secrets Management: Keeping API Keys and Credentials Safe

Secrets Management: Keeping API Keys and Credentials Safe

6
Comments
2 min read
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Comments
2 min read
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
Why I Built a Free Security Scanner That Makes Sense

Why I Built a Free Security Scanner That Makes Sense

4
Comments 1
5 min read
Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

2
Comments
4 min read
Selecting the appropriate Docker base image

Selecting the appropriate Docker base image

8
Comments
4 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

2
Comments
4 min read
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

6
Comments
3 min read
🚫Never Use finalize() in Java

🚫Never Use finalize() in Java

5
Comments
3 min read
The Silent Thief in Your Code: When AI Assistants Get Hacked

The Silent Thief in Your Code: When AI Assistants Get Hacked

Comments
2 min read
Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Comments
9 min read
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Comments
2 min read
Deploying a Honeypot SOC with Microsoft Sentinel

Deploying a Honeypot SOC with Microsoft Sentinel

1
Comments
3 min read
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan

Comments
2 min read
loading...