DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What Are Flash Loans?

What Are Flash Loans?

5
Comments
8 min read
From Weeks to Days: Atome’s Real-Time Feature Engineering with RisingWave

From Weeks to Days: Atome’s Real-Time Feature Engineering with RisingWave

Comments
3 min read
Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

Leaking MCP Agent Tools via Prompt Injection: A Banking Scenario PoC

4
Comments
2 min read
A New Day, a New Security Attack on npm…

A New Day, a New Security Attack on npm…

Comments
3 min read
The TON Scam Surge: Telegram’s Crypto Revolution Gone Wrong

The TON Scam Surge: Telegram’s Crypto Revolution Gone Wrong

5
Comments
5 min read
How Are You Preparing for AI-Powered Cyber Threats?

How Are You Preparing for AI-Powered Cyber Threats?

Comments
1 min read
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

1
Comments
17 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
How to use Testcontainers with PostgreSQL and SSL

How to use Testcontainers with PostgreSQL and SSL

Comments
6 min read
Automating Hub & Spoke Secure Azure Networks with Terraform (IaC) & Azure Firewalls

Automating Hub & Spoke Secure Azure Networks with Terraform (IaC) & Azure Firewalls

Comments 1
11 min read
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Comments
2 min read
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Comments
2 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

2
Comments
4 min read
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

6
Comments
3 min read
The Silent Thief in Your Code: When AI Assistants Get Hacked

The Silent Thief in Your Code: When AI Assistants Get Hacked

Comments
2 min read
Kubernetes Security Context: A Comprehensive Guide

Kubernetes Security Context: A Comprehensive Guide

Comments
5 min read
Deploying a Honeypot SOC with Microsoft Sentinel

Deploying a Honeypot SOC with Microsoft Sentinel

1
Comments
3 min read
Why the Principle of Least Privilege Is Critical for Non-Human Identities

Why the Principle of Least Privilege Is Critical for Non-Human Identities

Comments
7 min read
ShowDev: Building Web PSQC – From Idea to Website Certification Platform

ShowDev: Building Web PSQC – From Idea to Website Certification Platform

Comments
3 min read
AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

Comments
2 min read
Windows 11 September 2025 Update: New Features Explained

Windows 11 September 2025 Update: New Features Explained

Comments
3 min read
Security at Scale: Our npm Incident Response Story

Security at Scale: Our npm Incident Response Story

Comments
2 min read
CloudFront ECDSA Signed URLs: 91% Faster Generation, 55% Shorter URLs

CloudFront ECDSA Signed URLs: 91% Faster Generation, 55% Shorter URLs

Comments
4 min read
Cybersecurity Weekly #1: AI in Cybersecurity – How Hackers & Defenders Use It / series

Cybersecurity Weekly #1: AI in Cybersecurity – How Hackers & Defenders Use It / series

Comments
1 min read
loading...