DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
User Secrets: The Right Way to Protect API Keys in .NET

User Secrets: The Right Way to Protect API Keys in .NET

2
Comments
3 min read
Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

Audio Deepfakes: The Hidden Flaw in Our Defenses by Arvind Sundararajan

1
Comments
2 min read
Airdrops are safe but what about dusting 🤔 How to distinguish the two

Airdrops are safe but what about dusting 🤔 How to distinguish the two

Comments
5 min read
AI for Everyone: Secure Language Models Without the Hardware Hype

AI for Everyone: Secure Language Models Without the Hardware Hype

1
Comments
2 min read
Pod Identity: The Authentication Revolution Kubernetes Needed 🔐

Pod Identity: The Authentication Revolution Kubernetes Needed 🔐

Comments
7 min read
A Developer's Guide: How to Integrate a Payment Gateway Into a Website

A Developer's Guide: How to Integrate a Payment Gateway Into a Website

1
Comments 1
6 min read
How I lost $996,000 through Zoom

How I lost $996,000 through Zoom

5
Comments
5 min read
Creating and Maintaining Chroot Environments

Creating and Maintaining Chroot Environments

2
Comments
5 min read
Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

1
Comments
4 min read
Prompt Injection 2.0: The New Frontier of AI Attacks

Prompt Injection 2.0: The New Frontier of AI Attacks

3
Comments 1
7 min read
Oops I goto It Again

Oops I goto It Again

1
Comments
1 min read
How We Built Complete Formal Verification for Chronos Vault

How We Built Complete Formal Verification for Chronos Vault

Comments
4 min read
🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫

🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫

9
Comments
2 min read
7 Tips for Securing SSH Key Management on Linux Servers

7 Tips for Securing SSH Key Management on Linux Servers

1
Comments
3 min read
Building a Multi-Chain Security Vault with Mathematical Guarantees

Building a Multi-Chain Security Vault with Mathematical Guarantees

1
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.