DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JWT Tokens Decoded: What's Actually Inside That eyJ… String

JWT Tokens Decoded: What's Actually Inside That eyJ… String

Comments
4 min read
The Case for Secret Validation: Building an Open Source Tool to Reduce Risk

The Case for Secret Validation: Building an Open Source Tool to Reduce Risk

Comments
2 min read
Securing Your React Native App with FreeRasp: A Practical Implementation Guide

Securing Your React Native App with FreeRasp: A Practical Implementation Guide

Comments
4 min read
Unlock Free Auto-Renewing SSL on Namecheap: The Ultimate Let's Encrypt & Acme.sh Guide

Unlock Free Auto-Renewing SSL on Namecheap: The Ultimate Let's Encrypt & Acme.sh Guide

1
Comments
8 min read
Trust as a Vector What the EtherRAT Campaign Reveals About Security's Blind Spot

Trust as a Vector What the EtherRAT Campaign Reveals About Security's Blind Spot

Comments
4 min read
🔐Enforcing image provenance in Kubernetes using Cosign + Sigstore + Kyverno

🔐Enforcing image provenance in Kubernetes using Cosign + Sigstore + Kyverno

Comments
2 min read
I Read the DID and VC Specs So You Don't Have To

I Read the DID and VC Specs So You Don't Have To

Comments
4 min read
Server-Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF)

Comments
10 min read
Why your phishing simulations land in spam (and the SPF / DKIM / DMARC fix that actually works)

Why your phishing simulations land in spam (and the SPF / DKIM / DMARC fix that actually works)

Comments
4 min read
Proof-of-Commitment Internals: How the Scoring Algorithm Works

Proof-of-Commitment Internals: How the Scoring Algorithm Works

1
Comments
6 min read
WireGuard 技术解析:下一代 VPN 协议的设计、优势与实践

WireGuard 技术解析:下一代 VPN 协议的设计、优势与实践

2
Comments
1 min read
Automated Web Content Discovery: How Attackers Find Hidden Paths on Your Web Server in Minutes Using Free Tools

Automated Web Content Discovery: How Attackers Find Hidden Paths on Your Web Server in Minutes Using Free Tools

Comments
4 min read
The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

The Counter Galois Onion (CGO) Migration: Tor's Cryptographic Engine Swap

1
Comments
1 min read
The lethal trifecta in two-agent practice: seven incidents in 48 hours

The lethal trifecta in two-agent practice: seven incidents in 48 hours

Comments
10 min read
The dangerous part of AI agents is when they receive authority

The dangerous part of AI agents is when they receive authority

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.