DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
We added a dimension for DeepMind's Agent Traps to our AI governance scanner

We added a dimension for DeepMind's Agent Traps to our AI governance scanner

Comments
2 min read
CVE-2026-40310: CVE-2026-40310: Heap-Based Out-of-Bounds Write in ImageMagick JP2 Encoder

CVE-2026-40310: CVE-2026-40310: Heap-Based Out-of-Bounds Write in ImageMagick JP2 Encoder

Comments
2 min read
Deepfake Audio Attacks: A New Frontier in Social Engineering

Deepfake Audio Attacks: A New Frontier in Social Engineering

Comments
10 min read
SharePoint Zero-Day, Linux RCE Bypass, & Advanced Kerberoasting Detection

SharePoint Zero-Day, Linux RCE Bypass, & Advanced Kerberoasting Detection

Comments
3 min read
I caught my AI agent posting a customer's SSN to Slack. Here's what I built to stop it.

I caught my AI agent posting a customer's SSN to Slack. Here's what I built to stop it.

Comments
5 min read
Turning Security Scripts into a Web App: Why Flask Was My Framework of Choice

Turning Security Scripts into a Web App: Why Flask Was My Framework of Choice

1
Comments
3 min read
The 12 Security Issues I Keep Finding in Vibe-Coded Apps (Lovable, Bolt, v0)

The 12 Security Issues I Keep Finding in Vibe-Coded Apps (Lovable, Bolt, v0)

Comments
5 min read
Multi-agent accountability: who co-signs the handoff between your CrewAI agents?

Multi-agent accountability: who co-signs the handoff between your CrewAI agents?

Comments
4 min read
Why Relying Only on Passwords Is No Longer Secure Enough for UK Users

Why Relying Only on Passwords Is No Longer Secure Enough for UK Users

Comments
7 min read
I ran a security audit on my own Python codebase with an LLM for $0.90. Here is what it found.

I ran a security audit on my own Python codebase with an LLM for $0.90. Here is what it found.

Comments
4 min read
How to Find Every Consumer of Your Terraform Module

How to Find Every Consumer of Your Terraform Module

Comments
7 min read
The Agentic Enterprise Has an Architecture Now: Micro, Macro, and the Missing Governance Layer

The Agentic Enterprise Has an Architecture Now: Micro, Macro, and the Missing Governance Layer

Comments
4 min read
Claude Mythos and the Mobile App Security Wake-Up Call: Why Mobile Developers Can't Afford to Wait

Claude Mythos and the Mobile App Security Wake-Up Call: Why Mobile Developers Can't Afford to Wait

Comments
10 min read
The Zero-Trust Delivery Platform: DevSecOps Golden Paths for CI/CD at Scale

The Zero-Trust Delivery Platform: DevSecOps Golden Paths for CI/CD at Scale

1
Comments 1
14 min read
Survival in the 20-Hour Window: Why the Mythos Storm Makes Traditional Scanning Insufficient in Isolation

Survival in the 20-Hour Window: Why the Mythos Storm Makes Traditional Scanning Insufficient in Isolation

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.