DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Multi-Layered Security Architecture for IRIS Deployments on AWS with InterSystems IAM

Multi-Layered Security Architecture for IRIS Deployments on AWS with InterSystems IAM

1
Comments
57 min read
GHSA-FVFV-PPW4-7H2W: n8n Guardrail Bypass: When AI Safety Rails Are Made of Paper

GHSA-FVFV-PPW4-7H2W: n8n Guardrail Bypass: When AI Safety Rails Are Made of Paper

Comments
2 min read
NIST Just Launched an AI Agent Standards Initiative. Here's What Developers Should Do Now.

NIST Just Launched an AI Agent Standards Initiative. Here's What Developers Should Do Now.

1
Comments
5 min read
I Built a Fake Market Detector Using DEX Trade Fees

I Built a Fake Market Detector Using DEX Trade Fees

2
Comments
4 min read
CVE-2026-22728: The Old Switcheroo: Unsealing Secrets via Metadata Manipulation in Bitnami Sealed Secrets

CVE-2026-22728: The Old Switcheroo: Unsealing Secrets via Metadata Manipulation in Bitnami Sealed Secrets

Comments
2 min read
5 Essential API Security Headers Every Developer Should Know

5 Essential API Security Headers Every Developer Should Know

Comments
2 min read
Simple Android Encryption With No Accounts or Subscriptions

Simple Android Encryption With No Accounts or Subscriptions

1
Comments
3 min read
AI Code Is Creating a Security Debt Crisis

AI Code Is Creating a Security Debt Crisis

Comments
6 min read
Breaking the 400ms LCP Barrier: Next.js 15 & RFC 8058 Case Study.

Breaking the 400ms LCP Barrier: Next.js 15 & RFC 8058 Case Study.

1
Comments
1 min read
🔎 The Evasion of Simple File Hashing

🔎 The Evasion of Simple File Hashing

1
Comments
4 min read
ClamAv with Rust-TUI

ClamAv with Rust-TUI

1
Comments
1 min read
Your AI Agent Has Access to Your Stripe Keys. Here's How to Fix That.

Your AI Agent Has Access to Your Stripe Keys. Here's How to Fix That.

Comments
2 min read
Securing Enterprise AI with Gateways and Guardrails

Securing Enterprise AI with Gateways and Guardrails

6
Comments
3 min read
How to Protect Your Web App from Malware via File Uploads

How to Protect Your Web App from Malware via File Uploads

2
Comments
5 min read
Cisco SD-WAN Zero-Day: 3-Year APT Campaign Analysis

Cisco SD-WAN Zero-Day: 3-Year APT Campaign Analysis

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.