DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security Deep Dive: How the ERC-20 permit Function was Exploited for a $92K XAUt Theft

Security Deep Dive: How the ERC-20 permit Function was Exploited for a $92K XAUt Theft

1
Comments
2 min read
🔐 Observability Through Security Assessment

🔐 Observability Through Security Assessment

Comments
2 min read
Secuditor Lite – Diagnostic Security Tool for Windows

Secuditor Lite – Diagnostic Security Tool for Windows

1
Comments
2 min read
Why Modern AppSec Needs Location-Aware Security Testing

Why Modern AppSec Needs Location-Aware Security Testing

Comments
4 min read
How Piracy and Cheating Kill Revenue for Indie Games

How Piracy and Cheating Kill Revenue for Indie Games

1
Comments
5 min read
CORS: The Traffic Guard You Actually Need (And How It Protects User Sessions)

CORS: The Traffic Guard You Actually Need (And How It Protects User Sessions)

5
Comments 1
3 min read
The MCP server security problem nobody is talking about

The MCP server security problem nobody is talking about

Comments 1
2 min read
Mutating vs Validating Webhooks in Kubernetes

Mutating vs Validating Webhooks in Kubernetes

2
Comments
3 min read
Auditly - Enterprise Python Dependency Vulnerability Scanner

Auditly - Enterprise Python Dependency Vulnerability Scanner

Comments
3 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
Choosing and Configuring Azure Storage for Your Company Application

Choosing and Configuring Azure Storage for Your Company Application

5
Comments 1
5 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
Lock N' Key : The Developer's Vault

Lock N' Key : The Developer's Vault

Comments
2 min read
Ditching the Access Key: Implementing IAM Roles Anywhere for Secure Edge and On-Prem Workloads

Ditching the Access Key: Implementing IAM Roles Anywhere for Secure Edge and On-Prem Workloads

Comments
3 min read
Building a Hardware TOTP Authenticator on ESP32: The Memory Management Nightmare

Building a Hardware TOTP Authenticator on ESP32: The Memory Management Nightmare

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.