DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Comments
2 min read
From PKIX errors to a clean mTLS + Feign + IAM demo

From PKIX errors to a clean mTLS + Feign + IAM demo

Comments
4 min read
My First Ethical Open Redirect Scanner: From Zero to Shipped

My First Ethical Open Redirect Scanner: From Zero to Shipped

6
Comments
3 min read
how do you trust a third party API?

how do you trust a third party API?

Comments 1
2 min read
How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

Comments
3 min read
Building SENTINEL: How I Turned Network Packets Into Ghosts

Building SENTINEL: How I Turned Network Packets Into Ghosts

Comments
8 min read
Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Comments
5 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

Comments
3 min read
Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform

Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform

Comments
3 min read
Hello World is Hard: Surviving the SGX Setup

Hello World is Hard: Surviving the SGX Setup

1
Comments 1
5 min read
# Mastering SSH: Why Every Backend Developer Needs This Secure Superpower

# Mastering SSH: Why Every Backend Developer Needs This Secure Superpower

Comments
2 min read
You Thought Frida Was Stealth When Not Attached? Dirty Pages Beg to Differ

You Thought Frida Was Stealth When Not Attached? Dirty Pages Beg to Differ

Comments
2 min read
Docker Hardened Images are Free

Docker Hardened Images are Free

7
Comments
2 min read
OSI Layer 5—Session Layer Security

OSI Layer 5—Session Layer Security

Comments
4 min read
(Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶

(Part 4) Remote Attestation: How to Prove You Aren't a Dog on the Internet 🐶

3
Comments 1
4 min read
🔐Automated Security Incident Response System ⚠

🔐Automated Security Incident Response System ⚠

2
Comments
21 min read
How to Detect Browser-as-a-Service Scrapers in 2025

How to Detect Browser-as-a-Service Scrapers in 2025

1
Comments
6 min read
🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves

🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves

Comments
3 min read
CVE-2025–55182 Explained

CVE-2025–55182 Explained

1
Comments
6 min read
Building Secure Cloud Infrastructure -> How AI-Powered IaC Development Revolutionizes Security

Building Secure Cloud Infrastructure -> How AI-Powered IaC Development Revolutionizes Security

1
Comments
9 min read
HealthTech API Security: Protecting Patient Data with mTLS and OAuth 2.0

HealthTech API Security: Protecting Patient Data with mTLS and OAuth 2.0

Comments
3 min read
Product Engineering for Fintech Startups: Accelerating Compliance and Growth

Product Engineering for Fintech Startups: Accelerating Compliance and Growth

Comments
4 min read
InfraForge v1.0.0 Launch

InfraForge v1.0.0 Launch

Comments
2 min read
Are Shopify Stores Legit? How to Check Store Legitimacy

Are Shopify Stores Legit? How to Check Store Legitimacy

Comments
3 min read
loading...