DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
LeakScope: Supabase Security Scanner That Finds Leaks in Seconds

LeakScope: Supabase Security Scanner That Finds Leaks in Seconds

1
Comments
2 min read
Tokens Can Be Copied. Sockets Cannot. This Changes Everything.

Tokens Can Be Copied. Sockets Cannot. This Changes Everything.

34
Comments 11
10 min read
The most practical, fast, tiny command sandboxing for AI agents

The most practical, fast, tiny command sandboxing for AI agents

1
Comments 1
4 min read
Vector Database Breaches: How Embeddings Expose Your Sensitive Data

Vector Database Breaches: How Embeddings Expose Your Sensitive Data

1
Comments
5 min read
Model Theft: How Attackers Steal Your Fine-Tuned AI Models Through API Extraction

Model Theft: How Attackers Steal Your Fine-Tuned AI Models Through API Extraction

Comments
10 min read
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Comments
4 min read
The Hidden Problem with Embedded Chat Widgets (and How Iframes Fix It)

The Hidden Problem with Embedded Chat Widgets (and How Iframes Fix It)

Comments
9 min read
Industrial Robot Security: How Autonomous Systems Become Weapons in the Supply Chain

Industrial Robot Security: How Autonomous Systems Become Weapons in the Supply Chain

1
Comments
11 min read
CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

Comments
2 min read
Supply Chain Attacks: How Compromised Dependencies Weaponize Your Entire AI Infrastructure

Supply Chain Attacks: How Compromised Dependencies Weaponize Your Entire AI Infrastructure

Comments
11 min read
Zero-Trust Architecture in Practice: Why Perimeter Security Failed and What Actually Works

Zero-Trust Architecture in Practice: Why Perimeter Security Failed and What Actually Works

1
Comments
11 min read
Cascading Grid Failures: How Adversaries Weaponize RTOs and Demand Response

Cascading Grid Failures: How Adversaries Weaponize RTOs and Demand Response

Comments
8 min read
Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Comments
5 min read
CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

Comments
2 min read
đź‘» EDR Evasion: Unhooking the Kernel

đź‘» EDR Evasion: Unhooking the Kernel

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.