DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

The Forensic Black Box: Why Logs That Can Be Deleted Are Security Theater

Comments
3 min read
If It's Free, You're the Product: Investigating Spenderlog

If It's Free, You're the Product: Investigating Spenderlog

Comments
18 min read
Security news weekly round-up - 20th March 2026

Security news weekly round-up - 20th March 2026

2
Comments
2 min read
Reverse Engineering Norwegian Grocery Apps

Reverse Engineering Norwegian Grocery Apps

Comments
7 min read
A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.

A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.

1
Comments 1
2 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Comments
5 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

5
Comments
7 min read
| Digital Genie Cybersecurity

| Digital Genie Cybersecurity

Comments
4 min read
Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Comments
5 min read
Understanding Microsoft Entra Agent ID

Understanding Microsoft Entra Agent ID

3
Comments 3
6 min read
Rotifer v0.5.5-v0.6: Sandbox, Registry & Cold Start

Rotifer v0.5.5-v0.6: Sandbox, Registry & Cold Start

6
Comments
3 min read
WAF Checker — Guess what? Someone is actually using it!

WAF Checker — Guess what? Someone is actually using it!

Comments
1 min read
Using AI on a 15,000+ Line Codebase Is Broken (Unless You Do This)

Using AI on a 15,000+ Line Codebase Is Broken (Unless You Do This)

4
Comments 4
2 min read
Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.