DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
NFS, SMB, and File Sharing

NFS, SMB, and File Sharing

Comments
6 min read
Applying CIS Hardening for Linux Servers Using Ansible Automation

Applying CIS Hardening for Linux Servers Using Ansible Automation

Comments
4 min read
CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

2
Comments
3 min read
VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

Comments
8 min read
Getting Started with eslint-plugin-browser-security

Getting Started with eslint-plugin-browser-security

Comments
2 min read
Getting Started with eslint-plugin-jwt

Getting Started with eslint-plugin-jwt

Comments
3 min read
Getting Started with eslint-plugin-crypto

Getting Started with eslint-plugin-crypto

Comments
2 min read
Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Comments
2 min read
How to Add Audit Logs to Your App (The Complete Guide for Developers)

How to Add Audit Logs to Your App (The Complete Guide for Developers)

Comments
3 min read
Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

Mithridatium: An Open-Source Toolkit for Verifying the Integrity of Pretrained Machine Learning Models

2
Comments
2 min read
Security news weekly round-up - 12th December 2025

Security news weekly round-up - 12th December 2025

2
Comments
3 min read
A Natural Language Interface for Datadog Log Search

A Natural Language Interface for Datadog Log Search

3
Comments
4 min read
SENTINEL IMMUNE — Biological Immunity for IT Security

SENTINEL IMMUNE — Biological Immunity for IT Security

Comments
2 min read
Week 3 VPN Security: A Complete Quiz on Protocols, Attack Vectors & Defense Strategies

Week 3 VPN Security: A Complete Quiz on Protocols, Attack Vectors & Defense Strategies

Comments
15 min read
Week 3 Firewall Challenge: Set iptables Rules

Week 3 Firewall Challenge: Set iptables Rules

Comments
12 min read
Workload And Agentic Identity at Scale: Insights From CyberArk's Workload Identity Day Zero

Workload And Agentic Identity at Scale: Insights From CyberArk's Workload Identity Day Zero

Comments
6 min read
Weekly Rust Progress — Observability & Cryptography

Weekly Rust Progress — Observability & Cryptography

Comments
1 min read
Getting Started with eslint-plugin-nestjs-security

Getting Started with eslint-plugin-nestjs-security

Comments
2 min read
Which AI platforms integrate seamlessly with existing IT infrastructure?

Which AI platforms integrate seamlessly with existing IT infrastructure?

Comments
4 min read
API Security with encrypted value in endpoints

API Security with encrypted value in endpoints

Comments
2 min read
My 2025 Year in Review: From 0 to 200 AI Security Engines

My 2025 Year in Review: From 0 to 200 AI Security Engines

Comments 1
5 min read
Integrate Cloudflare Turnstile into Astro and React Application

Integrate Cloudflare Turnstile into Astro and React Application

Comments
5 min read
Nathbrok — Encrypted Messaging, File Storage & Business Communications Platform

Nathbrok — Encrypted Messaging, File Storage & Business Communications Platform

Comments
1 min read
I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.

I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.

Comments
6 min read
Decoding Urban Chaos: AI's Edge in Real-Time Traffic Anomaly Detection

Decoding Urban Chaos: AI's Edge in Real-Time Traffic Anomaly Detection

Comments
2 min read
loading...