DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing Apollo, Setting a New Record in Voice Deepfake Detection Accuracy

Introducing Apollo, Setting a New Record in Voice Deepfake Detection Accuracy

Comments
4 min read
Hello Everyone

Hello Everyone

Comments
1 min read
Criando um malware em Rust 🦀

Criando um malware em Rust 🦀

2
Comments
10 min read
Cloud Misconfigurations: The Hidden Door Hackers Love

Cloud Misconfigurations: The Hidden Door Hackers Love

Comments
3 min read
ADS — Alternate Data Streams (Beginner friendly PoC)

ADS — Alternate Data Streams (Beginner friendly PoC)

3
Comments 1
4 min read
3 Gotchas When Calling an IAP‑Protected Cloud Run API from a Chrome Extension (MV3)

3 Gotchas When Calling an IAP‑Protected Cloud Run API from a Chrome Extension (MV3)

7
Comments 2
3 min read
Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

7
Comments
2 min read
Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Comments
2 min read
What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

3
Comments 2
4 min read
Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Comments
4 min read
Stronger iPhone Security for Crypto Transactions

Stronger iPhone Security for Crypto Transactions

6
Comments
1 min read
IAM POLICIES

IAM POLICIES

1
Comments
3 min read
🔐 End-to-End File Encryption with AES and Integrity Checks

🔐 End-to-End File Encryption with AES and Integrity Checks

Comments
5 min read
The Dangers of JWT Decoding on the Frontend: What You Need to Know

The Dangers of JWT Decoding on the Frontend: What You Need to Know

Comments
1 min read
Post-Cookie Web: Building Privacy-First Analytics That Actually Work

Post-Cookie Web: Building Privacy-First Analytics That Actually Work

17
Comments
4 min read
🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense

🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense

2
Comments
1 min read
SOC 2 for Engineers: What It Is and Why Your Terrible Tagging Strategy Is an Audit Failure Waiting to Happen

SOC 2 for Engineers: What It Is and Why Your Terrible Tagging Strategy Is an Audit Failure Waiting to Happen

Comments
5 min read
How to Discover and Protect Sensitive Data Using CLI and SQL Tools

How to Discover and Protect Sensitive Data Using CLI and SQL Tools

Comments
2 min read
Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Comments
4 min read
Android Kiosk Mode Explained in Simple Steps

Android Kiosk Mode Explained in Simple Steps

Comments
5 min read
Outil de Cybersécurité du Jour - Aug 28, 2025

Outil de Cybersécurité du Jour - Aug 28, 2025

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 20, 2025

Outil de Cybersécurité du Jour - Sep 20, 2025

1
Comments
3 min read
AWS IAM POLICIES Deep Dive

AWS IAM POLICIES Deep Dive

1
Comments
4 min read
Fintech Security: Best Practices for Fintech Apps

Fintech Security: Best Practices for Fintech Apps

20
Comments
8 min read
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Comments
7 min read
loading...