DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Spaces in FinderBee: Organized, Secure AI Service Management

Spaces in FinderBee: Organized, Secure AI Service Management

Comments
3 min read
Auto-Magic: Generating Function Stubs with Evolutionary Algorithms

Auto-Magic: Generating Function Stubs with Evolutionary Algorithms

1
Comments
2 min read
Type-Aware Memory Allocation: The Secret Weapon Against Memory Corruption in iOS

Type-Aware Memory Allocation: The Secret Weapon Against Memory Corruption in iOS

7
Comments 1
4 min read
Audio Deepfakes: Exposing the Echo Chamber in AI Security

Audio Deepfakes: Exposing the Echo Chamber in AI Security

1
Comments
2 min read
The Audio Illusion: How Easily AI Deepfakes Deceive Our Ears

The Audio Illusion: How Easily AI Deepfakes Deceive Our Ears

1
Comments
2 min read
Audio Deepfakes: The Detection Illusion

Audio Deepfakes: The Detection Illusion

1
Comments
2 min read
AI Unleashed: Secure LLM Inference for Everyone

AI Unleashed: Secure LLM Inference for Everyone

5
Comments
2 min read
AI Unleashed, Privacy Preserved: The Future of Secure LLMs by Arvind Sundararajan

AI Unleashed, Privacy Preserved: The Future of Secure LLMs by Arvind Sundararajan

1
Comments
2 min read
Unlock AI Insights, Protect Your Secrets: Privacy-First LLMs Are Here!

Unlock AI Insights, Protect Your Secrets: Privacy-First LLMs Are Here!

1
Comments
2 min read
Audio Deepfakes: The Achilles' Heel in Voice Biometrics

Audio Deepfakes: The Achilles' Heel in Voice Biometrics

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

1
Comments
2 min read
AI for Everyone: Secure Language Models Without the Hardware Hype

AI for Everyone: Secure Language Models Without the Hardware Hype

1
Comments
2 min read
How I lost $996,000 through Zoom

How I lost $996,000 through Zoom

5
Comments
5 min read
David Gilbertson Warned us About The Latest NPM Attack

David Gilbertson Warned us About The Latest NPM Attack

Comments
1 min read
Managing Secrets in Dev Tools Without Getting Yelled At

Managing Secrets in Dev Tools Without Getting Yelled At

1
Comments
7 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
🚨 Warning for Anyone Using AI-Native Browsers Like Comet 🚨

🚨 Warning for Anyone Using AI-Native Browsers Like Comet 🚨

Comments
1 min read
The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

1
Comments
4 min read
My Experience Fixing clasp Login Errors on Google Workspace

My Experience Fixing clasp Login Errors on Google Workspace

Comments
3 min read
Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

Adversarial Attacks on Generative AI: A Growing Concern in the AI Era

1
Comments
4 min read
If You Use Telegram: Read This Now

If You Use Telegram: Read This Now

9
Comments 8
7 min read
From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

From a Single Container to a Secure Application Stack: A Practical Guide to Docker and Server Hardening

Comments
5 min read
Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

5
Comments
7 min read
loading...