DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

1
Comments
1 min read
Does Your App Reveal Its Server Header? You Might Be Helping Attackers

Does Your App Reveal Its Server Header? You Might Be Helping Attackers

3
Comments
3 min read
SonarQube: SCA Scanning of Unmanaged Dependencies in C/C++ Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in C/C++ Projects with Syft and SBOM Import

Comments 1
1 min read
Dissecting Digital Viruses: My First Steps in Malware Analysis

Dissecting Digital Viruses: My First Steps in Malware Analysis

Comments
2 min read
How to Check Your SSL Certificate (And Why It Matters)

How to Check Your SSL Certificate (And Why It Matters)

Comments 2
3 min read
CVE-2026-23518: Fleet Fiasco: The Unverified JWT That Opened the Gates

CVE-2026-23518: Fleet Fiasco: The Unverified JWT That Opened the Gates

Comments
2 min read
🔍 Software Composition Analysis (SCA)

🔍 Software Composition Analysis (SCA)

Comments
2 min read
Real-time Malicious Package Protection for AI Coding Agents

Real-time Malicious Package Protection for AI Coding Agents

1
Comments
2 min read
A quick guide to Python's Dictionary

A quick guide to Python's Dictionary

Comments 1
3 min read
Understanding RSA: A Simple Guide to Public-Key Math

Understanding RSA: A Simple Guide to Public-Key Math

6
Comments 2
3 min read
Rate Limiting Access Codes: The Delicate Balance Between Security and UX

Rate Limiting Access Codes: The Delicate Balance Between Security and UX

1
Comments
2 min read
Setting Up NextJS 13 with Auth0 and Sub-Domains: A Guide to Multi-Tenancy Web Apps

Setting Up NextJS 13 with Auth0 and Sub-Domains: A Guide to Multi-Tenancy Web Apps

Comments
5 min read
When Smart Devices Stop Working Offline

When Smart Devices Stop Working Offline

4
Comments
3 min read
Security Deep Dive: How the ERC-20 permit Function was Exploited for a $92K XAUt Theft

Security Deep Dive: How the ERC-20 permit Function was Exploited for a $92K XAUt Theft

1
Comments
2 min read
🔐 Observability Through Security Assessment

🔐 Observability Through Security Assessment

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.