DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Watch Out for These Slash-Like Unicode Characters in Phishing Links

Watch Out for These Slash-Like Unicode Characters in Phishing Links

Comments
2 min read
How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

How I Reduced ELB Access Log Analysis Time by 80% Using AWS Data Processing MCP Server

3
Comments
4 min read
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

1
Comments
6 min read
Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Comments
1 min read
Five ways ngrokkers 'doglab' gateways for homelabs and side projects

Five ways ngrokkers 'doglab' gateways for homelabs and side projects

3
Comments
3 min read
Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

6
Comments
3 min read
The deceptive simplicity of auth

The deceptive simplicity of auth

2
Comments
3 min read
How Termux Helps You Learn Linux and Cybersecurity

How Termux Helps You Learn Linux and Cybersecurity

1
Comments
4 min read
Cybr - Beginner's Guide to AWS CloudTrail for Security

Cybr - Beginner's Guide to AWS CloudTrail for Security

Comments
1 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Comments
1 min read
Why Your CLI Tool Needs OAuth (Not API Keys)

Why Your CLI Tool Needs OAuth (Not API Keys)

Comments
3 min read
VPC Security: Building Fortress-Like Network Architecture

VPC Security: Building Fortress-Like Network Architecture

1
Comments
6 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.