DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Lateral movement in multi-agent LLM systems

Lateral movement in multi-agent LLM systems

1
Comments
5 min read
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

I Built a Privacy-First JSON/YAML Toolkit After 80K Credentials Were Leaked

Comments
1 min read
We got tired of users asking "is this file legit?" so we built a verification system

We got tired of users asking "is this file legit?" so we built a verification system

Comments
2 min read
Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Why I Chose Svelte and Zero-Knowledge Encryption for My New Chrome Extension

Comments
2 min read
Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Building Deepfake-Resistant Hiring Systems: Cryptographic Audit Trails as Defense Against Nation-State Identity Fraud

Comments
14 min read
You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

You Locked the Front Door, But Invited the Thief Through the Update: Supply Chain Attacks Explained

Comments
10 min read
Configuring Microsoft Defender for Cloud for Enhanced Protection

Configuring Microsoft Defender for Cloud for Enhanced Protection

Comments
1 min read
Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Building Tamper-Proof Dual Audit Trails with VCP-XREF: A Developer's Guide

Comments
9 min read
I built what browsers refused to ship: SRI for fetch()

I built what browsers refused to ship: SRI for fetch()

Comments
2 min read
Modular Isolation Architecture (MIA)

Modular Isolation Architecture (MIA)

Comments
2 min read
Threat Modeling Isn’t Just for Big Apps (And That’s a Problem)

Threat Modeling Isn’t Just for Big Apps (And That’s a Problem)

Comments
2 min read
GPG Isn’t Broken, You’re Just Using It Wrong

GPG Isn’t Broken, You’re Just Using It Wrong

Comments
5 min read
Practical LDAP Operations Guide Management UI Release

Practical LDAP Operations Guide Management UI Release

Comments
1 min read
Top 15 Container Security Best Practices

Top 15 Container Security Best Practices

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.