DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Reverse Engineering Norwegian Grocery Apps

Reverse Engineering Norwegian Grocery Apps

Comments
7 min read
If It's Free, You're the Product: Investigating Spenderlog

If It's Free, You're the Product: Investigating Spenderlog

Comments
18 min read
Security news weekly round-up - 20th March 2026

Security news weekly round-up - 20th March 2026

2
Comments
2 min read
A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.

A French Sailor Went for a Jog. Journalists Found the Aircraft Carrier.

1
Comments 1
2 min read
Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Post-Quantum TLS in .NET 10 on Linux: ML-KEM in a Real Dockerized HTTP Client

Comments
5 min read
CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

CVE-2026-26273: The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS

Comments
2 min read
| Digital Genie Cybersecurity

| Digital Genie Cybersecurity

Comments
4 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

5
Comments
7 min read
Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Implementing BLE Security on ESP32: LE Secure Connections the Hard Way

Comments
5 min read
Understanding Microsoft Entra Agent ID

Understanding Microsoft Entra Agent ID

3
Comments 3
6 min read
Rotifer v0.5.5-v0.6: Sandbox, Registry & Cold Start

Rotifer v0.5.5-v0.6: Sandbox, Registry & Cold Start

6
Comments
3 min read
WAF Checker — Guess what? Someone is actually using it!

WAF Checker — Guess what? Someone is actually using it!

Comments
1 min read
Using AI on a 15,000+ Line Codebase Is Broken (Unless You Do This)

Using AI on a 15,000+ Line Codebase Is Broken (Unless You Do This)

4
Comments 4
2 min read
Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Securing AI-Powered Applications: A Comprehensive Guide to Protecting Your LLM-Integrated Web App

Comments
8 min read
What Your IP Address Actually Reveals (A Developer's Perspective)

What Your IP Address Actually Reveals (A Developer's Perspective)

2
Comments 1
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.