DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Linux firewall- iptables

Linux firewall- iptables

Comments
2 min read
Why We Don't Use Browser Extensions: The Clickjacking Problem

Why We Don't Use Browser Extensions: The Clickjacking Problem

Comments
5 min read
Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (Guía de Supervivencia)

Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (Guía de Supervivencia)

1
Comments
5 min read
AI Agents and context-aware permissions

AI Agents and context-aware permissions

Comments
8 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

Comments
3 min read
How to safely let AI Agents query your data: 5 Essential Layers

How to safely let AI Agents query your data: 5 Essential Layers

1
Comments
12 min read
The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

5
Comments
6 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
I built an Advanced Python & JS Obfuscator with AI Auto-Decryption 🛡️

I built an Advanced Python & JS Obfuscator with AI Auto-Decryption 🛡️

1
Comments
2 min read
Why Some Smart Contracts Pass an Audit… But Still Get Hacked.

Why Some Smart Contracts Pass an Audit… But Still Get Hacked.

5
Comments
4 min read
SQL Injection: The Security Nightmare Every Developer Must Understand

SQL Injection: The Security Nightmare Every Developer Must Understand

2
Comments
6 min read
Security Groups vs NACLs: A Simple Breakdown

Security Groups vs NACLs: A Simple Breakdown

Comments
4 min read
Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

Strengthening Linux Security: A Step-by-Step Guide to SSH Public Key Authentication

1
Comments
2 min read
From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

6
Comments 1
5 min read
Authentication: JWTs vs. Sessions (My Study Notes)

Authentication: JWTs vs. Sessions (My Study Notes)

1
Comments
1 min read
AIDE Daily Automation Build - Checklist Your Implementation Roadmap

AIDE Daily Automation Build - Checklist Your Implementation Roadmap

Comments
2 min read
OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know

OpenAI Mixpanel Breach 2025: What Happened, Who Was Affected, and What You Need to Know

Comments
3 min read
Top 10 AWS Security Mistakes Beginners Must Avoid

Top 10 AWS Security Mistakes Beginners Must Avoid

Comments
6 min read
ZeroThreat in the AppSec Landscape: A Technical & Operational Assessment

ZeroThreat in the AppSec Landscape: A Technical & Operational Assessment

Comments
4 min read
How I Secured My Static Website at the Edge Using Amazon CloudFront

How I Secured My Static Website at the Edge Using Amazon CloudFront

Comments 2
4 min read
I built a passwordless access system for cases where identity is unnecessary

I built a passwordless access system for cases where identity is unnecessary

1
Comments
1 min read
Best Practices for Hardening Enterprise Linux Servers and Enhancing Cloud Security

Best Practices for Hardening Enterprise Linux Servers and Enhancing Cloud Security

Comments
3 min read
CI/CD Security Architecture: End-to-End Guide for SAST, SCA, DAST, and Automated Triage

CI/CD Security Architecture: End-to-End Guide for SAST, SCA, DAST, and Automated Triage

Comments
10 min read
🛡️ How to Keep Your Application Updated on the Latest Security Threats & Vulnerabilities

🛡️ How to Keep Your Application Updated on the Latest Security Threats & Vulnerabilities

Comments
3 min read
loading...