DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How To Set Up Multi-Factor Authentication for SSH on Ubuntu?

How To Set Up Multi-Factor Authentication for SSH on Ubuntu?

Comments
3 min read
Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities

Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities

Comments
9 min read
Making sure your PDF compliance and privacy requirements are met with JoyDoc

Making sure your PDF compliance and privacy requirements are met with JoyDoc

7
Comments
12 min read
Building a Secure Fortress within AI: A Developer's Guide to Full-Stack Security 🏰

Building a Secure Fortress within AI: A Developer's Guide to Full-Stack Security 🏰

1
Comments 2
10 min read
🔒 The Future of Authentication Is Coming

🔒 The Future of Authentication Is Coming

1
Comments
1 min read
Outil de Cybersécurité du Jour - Aug 15, 2025

Outil de Cybersécurité du Jour - Aug 15, 2025

Comments
3 min read
Outil de Cybersécurité du Jour - Aug 15, 2025

Outil de Cybersécurité du Jour - Aug 15, 2025

Comments
2 min read
How to Secure Your Forgot Password Endpoint (Best Practices for Developers)

How to Secure Your Forgot Password Endpoint (Best Practices for Developers)

Comments
3 min read
How to decrypt broken GCM ciphertext

How to decrypt broken GCM ciphertext

4
Comments
4 min read
The End of .env Chaos: Introducing EnvShield

The End of .env Chaos: Introducing EnvShield

2
Comments
4 min read
A Reasonably Simple, Secure Password Scheme

A Reasonably Simple, Secure Password Scheme

Comments
8 min read
How to secure MCP servers with Vault + ToolHive in Kubernetes

How to secure MCP servers with Vault + ToolHive in Kubernetes

7
Comments
1 min read
🔐 Breaking Down Identity, Authentication, Authorization & SSO

🔐 Breaking Down Identity, Authentication, Authorization & SSO

1
Comments
3 min read
What is JWKS? JSON Web Key Set — Short Guide

What is JWKS? JSON Web Key Set — Short Guide

Comments
5 min read
Fraudsters Can't Hide Anymore. Here's How to Spot Them.

Fraudsters Can't Hide Anymore. Here's How to Spot Them.

Comments
4 min read
Outil de Cybersécurité du Jour - Aug 14, 2025

Outil de Cybersécurité du Jour - Aug 14, 2025

Comments
2 min read
Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

3
Comments
2 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
Protect Your Environments: Practical Security Tips for Smarter Deployments

Protect Your Environments: Practical Security Tips for Smarter Deployments

Comments
5 min read
Introducing WtfCode.dev: Learn from the Worst Code Examples

Introducing WtfCode.dev: Learn from the Worst Code Examples

Comments
3 min read
Security news weekly round-up - 5th September 2025

Security news weekly round-up - 5th September 2025

1
Comments
2 min read
IA e Segurança de Software: Automação ou Novo Vetor de Ataques?

IA e Segurança de Software: Automação ou Novo Vetor de Ataques?

Comments
11 min read
Building AuthPress: From Simple Telegram 2FA to Extensible WordPress Security Platform

Building AuthPress: From Simple Telegram 2FA to Extensible WordPress Security Platform

1
Comments
2 min read
Building a Unified AI Safety Platform

Building a Unified AI Safety Platform

Comments
5 min read
🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI

🚀 From Zero to Secure: Deploying a Hardened Azure Environment with Terraform & Azure CLI

1
Comments
3 min read
loading...