DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
"Apple Music" Sent a Renewal Email to my Android…

"Apple Music" Sent a Renewal Email to my Android…

Comments
4 min read
# 🛰️ Azure Networking Series — Creating a Subnet, NSG, and Securing an FTP Server Environment

# 🛰️ Azure Networking Series — Creating a Subnet, NSG, and Securing an FTP Server Environment

1
Comments
3 min read
Content Security Policy (CSP)

Content Security Policy (CSP)

Comments
4 min read
**_**_**_ **_Using Caddy as a Reverse Proxy with Automatic HTTP_**S_**_**_**

**_**_**_ **_Using Caddy as a Reverse Proxy with Automatic HTTP_**S_**_**_**

Comments
4 min read
The Security Logic Behind LLM Jailbreaking

The Security Logic Behind LLM Jailbreaking

1
Comments
6 min read
LogTide 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap

LogTide 0.3.0: Full SIEM Dashboard, C# SDK, and Our Roadmap

10
Comments
4 min read
How I Detected and Stopped a Real-World RCE Attack on My Next.js App (CVE-2025-55182 / React2Shell)

How I Detected and Stopped a Real-World RCE Attack on My Next.js App (CVE-2025-55182 / React2Shell)

Comments
4 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
🧭 Understanding CORS: Preflight vs Actual API Response

🧭 Understanding CORS: Preflight vs Actual API Response

Comments
2 min read
Why CAPTCHAs today are so bad (and what we should be building instead)

Why CAPTCHAs today are so bad (and what we should be building instead)

1
Comments 2
1 min read
Day 3 — Trusted Supply Chain (Through the Gate)

Day 3 — Trusted Supply Chain (Through the Gate)

8
Comments
1 min read
Fine-Tune Access, Visibility, and Security

Fine-Tune Access, Visibility, and Security

Comments
3 min read
SQL Injection Audit Challenge Week 1

SQL Injection Audit Challenge Week 1

Comments
27 min read
OWASP Top 10 e segurança web

OWASP Top 10 e segurança web

Comments
4 min read
Running Out of Data: How Synthetic Data is Saving the Future of AI

Running Out of Data: How Synthetic Data is Saving the Future of AI

10
Comments
4 min read
Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Comments
4 min read
How to Write Secure Firebase Rules

How to Write Secure Firebase Rules

Comments
7 min read
How Quality Assurance Engineers Can Strengthen Application Security

How Quality Assurance Engineers Can Strengthen Application Security

1
Comments
2 min read
Why Your AI Coding Assistant Needs a Security Layer (And How to Add One in 2 Minutes)

Why Your AI Coding Assistant Needs a Security Layer (And How to Add One in 2 Minutes)

3
Comments
4 min read
90-Day Proven Post-Quantum TLS Readiness Sprint

90-Day Proven Post-Quantum TLS Readiness Sprint

2
Comments
7 min read
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

1
Comments
8 min read
The Challenge of Large File Checksums

The Challenge of Large File Checksums

Comments
3 min read
Preventing AI Project Failures Through Effective Prompt Engineering

Preventing AI Project Failures Through Effective Prompt Engineering

1
Comments
5 min read
Hacking Mongoose: How I Built a Global Plugin to Stop Data Leaks 🛡️

Hacking Mongoose: How I Built a Global Plugin to Stop Data Leaks 🛡️

3
Comments 4
3 min read
Snoop On Your Local Network with tcpdump

Snoop On Your Local Network with tcpdump

Comments
4 min read
loading...