DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

YAKMESH™ v1.7.0 - Post-Quantum P2P Mesh Network

Comments
1 min read
GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

GHSA-5882-5RX9-XGXP: Crawl4AI RCE: Hook, Line, and Sinker into Your Docker Container

Comments
2 min read
Physical Proof of Proximity (PoPI): Making Sybil Attacks Physically Expensive

Physical Proof of Proximity (PoPI): Making Sybil Attacks Physically Expensive

1
Comments
3 min read
The "Virtual Air Gap": Building Fort Knox in AWS

The "Virtual Air Gap": Building Fort Knox in AWS

Comments
4 min read
Sharing my hands-on Enterprise Cloud Platform project

Sharing my hands-on Enterprise Cloud Platform project

Comments
2 min read
How to create OTP flow system on Node.js (step-by- step)

How to create OTP flow system on Node.js (step-by- step)

1
Comments
3 min read
CVE-2025-8217: Amazon Q's Self-Sabotage: The Backdoor That Couldn't Code

CVE-2025-8217: Amazon Q's Self-Sabotage: The Backdoor That Couldn't Code

Comments
2 min read
CVE-2026-23535: Trust Issues: Arbitrary File Write in Weblate CLI (CVE-2026-23535)

CVE-2026-23535: Trust Issues: Arbitrary File Write in Weblate CLI (CVE-2026-23535)

Comments
2 min read
5 Security Chores You Should Offload to Cloud Agents (Before They Burn You Out)

5 Security Chores You Should Offload to Cloud Agents (Before They Burn You Out)

1
Comments
4 min read
Building Privacy-First PDF Tools That Run Entirely in the Browser

Building Privacy-First PDF Tools That Run Entirely in the Browser

Comments
1 min read
CVE-2026-23527: Case Sensitivity Kills: HTTP Request Smuggling in H3

CVE-2026-23527: Case Sensitivity Kills: HTTP Request Smuggling in H3

Comments
2 min read
Metasploit Deep Dive: Staged vs. Stageless Payloads — A Practical Lab

Metasploit Deep Dive: Staged vs. Stageless Payloads — A Practical Lab

Comments
3 min read
Security best practices in Umami codebase - part 1.1

Security best practices in Umami codebase - part 1.1

Comments
4 min read
GHSA-58Q2-9X27-H2JM: The Infinite Buffer: Crashing Craft CMS via Axios Data URIs

GHSA-58Q2-9X27-H2JM: The Infinite Buffer: Crashing Craft CMS via Axios Data URIs

Comments
2 min read
Gommitlint - a tool for keeping your commit quality

Gommitlint - a tool for keeping your commit quality

Comments
3 min read
CVE-2026-1002: Ghost in the Machine: Vert.x Cache Poisoning DoS

CVE-2026-1002: Ghost in the Machine: Vert.x Cache Poisoning DoS

Comments
2 min read
CVE-2026-22775: Devalue, Indeed: How a Simple Serializer Can Crash Your Svelte App

CVE-2026-22775: Devalue, Indeed: How a Simple Serializer Can Crash Your Svelte App

Comments
2 min read
How to Protect LLM Inputs from Prompt Injection (Without Building It Yourself)

How to Protect LLM Inputs from Prompt Injection (Without Building It Yourself)

Comments
4 min read
Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

Cybersecurity Weekly — Latest Highlights (Jan 16–17, 2026)

1
Comments
2 min read
Run Phishing Simulations for $37/Month Instead of $30,000/Year

Run Phishing Simulations for $37/Month Instead of $30,000/Year

Comments
2 min read
AI-based Face Authentication system built with Python and deployed on Google Cloud Platform (GCP)!

AI-based Face Authentication system built with Python and deployed on Google Cloud Platform (GCP)!

Comments 1
1 min read
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night

Comments
13 min read
Kubernetes IAM & RBAC for DevOps & SRE

Kubernetes IAM & RBAC for DevOps & SRE

1
Comments
4 min read
CVE-2026-23519: Betrayal by Optimization: How LLVM Broke Rust's Constant-Time Promises

CVE-2026-23519: Betrayal by Optimization: How LLVM Broke Rust's Constant-Time Promises

Comments
2 min read
CVE-2025-66292: DPanel's Delete Function Works Too Well: A Tale of Path Traversal

CVE-2025-66292: DPanel's Delete Function Works Too Well: A Tale of Path Traversal

Comments
2 min read
loading...