DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Kubernetes Security Context: A Comprehensive Guide

Kubernetes Security Context: A Comprehensive Guide

1
Comments
5 min read
AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

1
Comments
2 min read
Enable DNSSEC Support in Your Node.js Application

Enable DNSSEC Support in Your Node.js Application

1
Comments
6 min read
Introducing FirstImpressionAI: Smart Resume–Job Match Analysis and Tailored Cover Letters

Introducing FirstImpressionAI: Smart Resume–Job Match Analysis and Tailored Cover Letters

Comments
4 min read
Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Comments
7 min read
Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

8
Comments 2
17 min read
Warpgate: The Smart Bastion Host That Will Change Your Workflow

Warpgate: The Smart Bastion Host That Will Change Your Workflow

Comments
3 min read
Networking Series 9: VPC Endpoints

Networking Series 9: VPC Endpoints

Comments
5 min read
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Comments
3 min read
How Online JWT Decode Tools Work: Build One Yourself Step-by-Step

How Online JWT Decode Tools Work: Build One Yourself Step-by-Step

Comments
1 min read
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

16
Comments
4 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

11
Comments 2
5 min read
HTB - Bastion (Windows)

HTB - Bastion (Windows)

1
Comments
1 min read
Eyes Wide Shut

Eyes Wide Shut

3
Comments
16 min read
Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Comments
5 min read
Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

6
Comments
4 min read
Managing Secrets in Dev Tools Without Getting Yelled At

Managing Secrets in Dev Tools Without Getting Yelled At

2
Comments
7 min read
Will Cybercrime Ever Be Unstoppable?

Will Cybercrime Ever Be Unstoppable?

Comments
2 min read
Should I Accept the Term?

Should I Accept the Term?

Comments
2 min read
Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update

Protecting Yourself from Spear Phishing Attacks Such as the One Targeting NPM Maintainers with 2FA Update

1
Comments
3 min read
Petoron Quantum Standard (PQS)

Petoron Quantum Standard (PQS)

Comments
1 min read
Petoron Local Destroyer (PLD)

Petoron Local Destroyer (PLD)

Comments
1 min read
What Really Defines a Botnet?

What Really Defines a Botnet?

2
Comments
2 min read
Essential Cybersecurity Practices for Small Businesses Without a Tech Team

Essential Cybersecurity Practices for Small Businesses Without a Tech Team

1
Comments
2 min read
SPF, DKIM, and DMARC Explained Simply (with Infographics)

SPF, DKIM, and DMARC Explained Simply (with Infographics)

Comments 1
1 min read
loading...