DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Vulnerawa on macOS: Fixing the Silent Launch Failure After Gatekeeper Approval

Comments
4 min read
CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

CVE-2026-2391: Death by a Thousand Commas: Deep Dive into CVE-2026-2391

Comments
2 min read
Native Auditing Architecture: Embedding Traceability Intelligence within the Database Core.

Native Auditing Architecture: Embedding Traceability Intelligence within the Database Core.

Comments
1 min read
Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Comments
5 min read
CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

CVE-2026-26185: Clockwatching: Enumerating Directus Users via Timing Side-Channels

Comments
2 min read
đź‘» EDR Evasion: Unhooking the Kernel

đź‘» EDR Evasion: Unhooking the Kernel

Comments
6 min read
Hello World — Independent Security Researcher Joining DEV

Hello World — Independent Security Researcher Joining DEV

Comments
1 min read
Your AI Chatbot Has No Immune System. Here's How Attackers Exploit That.

Your AI Chatbot Has No Immune System. Here's How Attackers Exploit That.

5
Comments 1
3 min read
Provide storage for the public website

Provide storage for the public website

Comments
7 min read
Azure DevOps Pipelines: Building Enterprise CI/CD That Scales

Azure DevOps Pipelines: Building Enterprise CI/CD That Scales

Comments
15 min read
Replacing SSH Keys with Teleport: A Zero Trust Migration Guide

Replacing SSH Keys with Teleport: A Zero Trust Migration Guide

Comments
17 min read
Secrets Management with Infisical in Production

Secrets Management with Infisical in Production

Comments
8 min read
Hardening Container Images: A Defense-in-Depth Approach for Production Workloads

Hardening Container Images: A Defense-in-Depth Approach for Production Workloads

Comments
12 min read
Container Security from Build to Runtime: A Practical Hardening Guide

Container Security from Build to Runtime: A Practical Hardening Guide

Comments
17 min read
OAuth Explained Like You're 5

OAuth Explained Like You're 5

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.