DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How To Secure Laravel API Authentication with Sanctum — Complete Security Guide

How To Secure Laravel API Authentication with Sanctum — Complete Security Guide

1
Comments
1 min read
Launching ANCP — Secure Login for AI Agents Without VPN or OAuth

Launching ANCP — Secure Login for AI Agents Without VPN or OAuth

Comments
2 min read
Mastering AWS IAM: A Security Professional's Guide

Mastering AWS IAM: A Security Professional's Guide

Comments
3 min read
iOS Device Comedy

iOS Device Comedy

2
Comments 5
3 min read
🔒 Disable Root SSH Login — Simple Step, Huge Security Win

🔒 Disable Root SSH Login — Simple Step, Huge Security Win

Comments
2 min read
How to Deploy SafeLine WAF on a Hestia Control Panel VPS

How to Deploy SafeLine WAF on a Hestia Control Panel VPS

5
Comments 1
4 min read
Laravel’s Str::mask: Elegant String Masking Made Simple

Laravel’s Str::mask: Elegant String Masking Made Simple

1
Comments 4
2 min read
Security news weekly round-up - 22nd August 2025

Security news weekly round-up - 22nd August 2025

Comments
3 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
ă‚“, and?

ă‚“, and?

4
Comments
4 min read
The Hidden Security Risk in Your NestJS App: A Validation Story

The Hidden Security Risk in Your NestJS App: A Validation Story

1
Comments
3 min read
How to check if your Supabase table is open to public

How to check if your Supabase table is open to public

1
Comments
3 min read
Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

1
Comments 1
3 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Watch Out for These Slash-Like Unicode Characters in Phishing Links

Watch Out for These Slash-Like Unicode Characters in Phishing Links

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.