DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Serverless Student Management System (AWS)

Serverless Student Management System (AWS)

1
Comments
2 min read
AI coding agents can run rm -rf / on your machine. Here's how to stop them

AI coding agents can run rm -rf / on your machine. Here's how to stop them

Comments
2 min read
A Guide to Production-Ready Security, Logging and Architecture in the express app

A Guide to Production-Ready Security, Logging and Architecture in the express app

Comments
4 min read
OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
JWT Is Not Secure — Until You Understand JWS and JWE

JWT Is Not Secure — Until You Understand JWS and JWE

5
Comments
3 min read
Building Own Block Cipher: Part 3 - AES

Building Own Block Cipher: Part 3 - AES

Comments
6 min read
"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

Comments
2 min read
Building a Home SOC Lab

Building a Home SOC Lab

Comments
2 min read
Week 2 Scripting Challenge: Log Parser

Week 2 Scripting Challenge: Log Parser

2
Comments
12 min read
Hacking Ético

Hacking Ético

Comments
1 min read
How to Prevent Objects from Being Modified in JavaScript

How to Prevent Objects from Being Modified in JavaScript

Comments
2 min read
What breaks trust in authentication UX

What breaks trust in authentication UX

4
Comments 1
3 min read
Critical Security Vulnerability Found in React Server Components (RSC)

Critical Security Vulnerability Found in React Server Components (RSC)

2
Comments 1
1 min read
Implementing Authentication Middleware in Next.js with i18n Support

Implementing Authentication Middleware in Next.js with i18n Support

Comments
3 min read
Support is the weakest link in authentication (unless you design it not to be)

Support is the weakest link in authentication (unless you design it not to be)

5
Comments 6
3 min read
SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

Comments
2 min read
Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

2
Comments
17 min read
Machine Learning vs. Cyber Threats: A Smarter Defense

Machine Learning vs. Cyber Threats: A Smarter Defense

Comments 3
6 min read
Day 5 — Environment Drift (The Fog in the Valley)

Day 5 — Environment Drift (The Fog in the Valley)

8
Comments
2 min read
Christmas Gift: Open-Sourcing 99 AI Security Detection Engines

Christmas Gift: Open-Sourcing 99 AI Security Detection Engines

Comments 2
2 min read
Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Comments
1 min read
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

1
Comments
7 min read
Week 2 Scripting Challenge: Caesarian Cipher

Week 2 Scripting Challenge: Caesarian Cipher

Comments
6 min read
How to Move Vital Records from the Filing Cabinet to a Secure Digital Vault

How to Move Vital Records from the Filing Cabinet to a Secure Digital Vault

Comments
2 min read
Key Take-a-Ways From Microsoft Ignite 2025

Key Take-a-Ways From Microsoft Ignite 2025

Comments
4 min read
loading...