DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
**_**_**_ **_Using Caddy as a Reverse Proxy with Automatic HTTP_**S_**_**_**

**_**_**_ **_Using Caddy as a Reverse Proxy with Automatic HTTP_**S_**_**_**

Comments
4 min read
The Security Logic Behind LLM Jailbreaking

The Security Logic Behind LLM Jailbreaking

1
Comments
6 min read
LogTide 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap

LogTide 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap

10
Comments
4 min read
Start Here: PainTracker and the CrisisCore Build Log

Start Here: PainTracker and the CrisisCore Build Log

Comments
3 min read
How I Detected and Stopped a Real-World RCE Attack on My Next.js App (CVE-2025-55182 / React2Shell)

How I Detected and Stopped a Real-World RCE Attack on My Next.js App (CVE-2025-55182 / React2Shell)

Comments
4 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
đź§­ Understanding CORS: Preflight vs Actual API Response

đź§­ Understanding CORS: Preflight vs Actual API Response

Comments
2 min read
Why CAPTCHAs today are so bad (and what we should be building instead)

Why CAPTCHAs today are so bad (and what we should be building instead)

1
Comments 2
1 min read
Day 3 — Trusted Supply Chain (Through the Gate)

Day 3 — Trusted Supply Chain (Through the Gate)

8
Comments
1 min read
Fine-Tune Access, Visibility, and Security

Fine-Tune Access, Visibility, and Security

Comments
3 min read
SQL Injection Audit Challenge Week 1

SQL Injection Audit Challenge Week 1

Comments
27 min read
Running Out of Data: How Synthetic Data is Saving the Future of AI

Running Out of Data: How Synthetic Data is Saving the Future of AI

10
Comments
4 min read
Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Comments
4 min read
How to Write Secure Firebase Rules

How to Write Secure Firebase Rules

Comments
7 min read
How Quality Assurance Engineers Can Strengthen Application Security

How Quality Assurance Engineers Can Strengthen Application Security

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.