DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Frida를 이용한 Android 앱 분석과 리버스 엔지니어링

Frida를 이용한 Android 앱 분석과 리버스 엔지니어링

Comments
2 min read
MITM 공격과 네트워크 보안 - SSL Pinning, HSTS 완벽 가이드

MITM 공격과 네트워크 보안 - SSL Pinning, HSTS 완벽 가이드

Comments
1 min read
암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

암호화 기초 - 대칭키, HMAC, 그리고 메시지 인증

Comments
2 min read
ProGuard 완벽 가이드 - Android 코드 난독화와 최적화

ProGuard 완벽 가이드 - Android 코드 난독화와 최적화

Comments
2 min read
Beyond the Cloud: Why Personal Data Sovereignty Starts with Better Encryption

Beyond the Cloud: Why Personal Data Sovereignty Starts with Better Encryption

1
Comments
3 min read
LLMs Don’t Have a Security Layer — So I Built One

LLMs Don’t Have a Security Layer — So I Built One

Comments
2 min read
Mitigating CVE-2025-67288 in Umbraco (if you feel you need to)

Mitigating CVE-2025-67288 in Umbraco (if you feel you need to)

2
Comments
6 min read
Cyber Threats the Gaming Industry Faced in 2025, And What Indie Game Developers Can Learn

Cyber Threats the Gaming Industry Faced in 2025, And What Indie Game Developers Can Learn

Comments
4 min read
How to Password-Protect dockurr/windows noVNC (Port 8006) Using Nginx Reverse Proxy

How to Password-Protect dockurr/windows noVNC (Port 8006) Using Nginx Reverse Proxy

Comments
2 min read
웹 보안과 인증: SSL/TLS, OAuth, Authentication

웹 보안과 인증: SSL/TLS, OAuth, Authentication

Comments
2 min read
When 4chan suddenly gives you 403 or an endless CAPTCHA

When 4chan suddenly gives you 403 or an endless CAPTCHA

Comments
5 min read
I Hunted for n8n's Security Flaws. The Truth Was Far More Disturbing Than Any Exploit.

I Hunted for n8n's Security Flaws. The Truth Was Far More Disturbing Than Any Exploit.

Comments
3 min read
Fail-closed evidence for LLM tool calls (SHA-256 + MCP)

Fail-closed evidence for LLM tool calls (SHA-256 + MCP)

Comments 3
4 min read
Kyverno Without the Noise: Practical Kubernetes Policies for Security & Best Practices

Kyverno Without the Noise: Practical Kubernetes Policies for Security & Best Practices

3
Comments
6 min read
Reducing False Positives in WAF: Combining OWASP Rules with AI Context

Reducing False Positives in WAF: Combining OWASP Rules with AI Context

1
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.