DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Outil de Cybersécurité du Jour - Aug 12, 2025

Outil de Cybersécurité du Jour - Aug 12, 2025

Comments
3 min read
How to add secrets in Kubernetes deployments

How to add secrets in Kubernetes deployments

Comments
1 min read
Outil de Cybersécurité du Jour - Aug 13, 2025

Outil de Cybersécurité du Jour - Aug 13, 2025

Comments
3 min read
If You Have a Single Mum - Read This

If You Have a Single Mum - Read This

5
Comments 8
10 min read
Automating AWS WAF IP Threat list with ProxyCheck.io

Automating AWS WAF IP Threat list with ProxyCheck.io

1
Comments
8 min read
Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Comments
2 min read
Kubernetes Security Context: A Comprehensive Guide

Kubernetes Security Context: A Comprehensive Guide

2
Comments
5 min read
Cybersecurity Weekly #1: AI in Cybersecurity – How Hackers & Defenders Use It / series

Cybersecurity Weekly #1: AI in Cybersecurity – How Hackers & Defenders Use It / series

Comments
1 min read
AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

1
Comments
2 min read
Enable DNSSEC Support in Your Node.js Application

Enable DNSSEC Support in Your Node.js Application

1
Comments
6 min read
PromptLock: When AI Meets Ransomware

PromptLock: When AI Meets Ransomware

Comments
2 min read
CloudFront ECDSA Signed URLs: 91% Faster Generation, 55% Shorter URLs

CloudFront ECDSA Signed URLs: 91% Faster Generation, 55% Shorter URLs

1
Comments 1
4 min read
Introducing FirstImpressionAI: Smart Resume–Job Match Analysis and Tailored Cover Letters

Introducing FirstImpressionAI: Smart Resume–Job Match Analysis and Tailored Cover Letters

Comments
4 min read
Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Comments
7 min read
Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

7
Comments 2
17 min read
Warpgate: The Smart Bastion Host That Will Change Your Workflow

Warpgate: The Smart Bastion Host That Will Change Your Workflow

Comments
3 min read
Networking Series 9: VPC Endpoints

Networking Series 9: VPC Endpoints

Comments
5 min read
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Comments
3 min read
How Online JWT Decode Tools Work: Build One Yourself Step-by-Step

How Online JWT Decode Tools Work: Build One Yourself Step-by-Step

Comments
1 min read
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

16
Comments
4 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

11
Comments 2
5 min read
HTB - Bastion (Windows)

HTB - Bastion (Windows)

1
Comments
1 min read
Eyes Wide Shut

Eyes Wide Shut

Comments
16 min read
Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Dev Platform Breaches: How GitHub, Jira & Confluence Exposed Mercedes, Apple, Disney & Others

Comments
5 min read
Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

Creating and Configuring Network Security Groups in Azure: A Step-by-Step Guide

5
Comments
4 min read
loading...