DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Deploy SafeLine WAF on a Hestia Control Panel VPS

How to Deploy SafeLine WAF on a Hestia Control Panel VPS

5
Comments 1
4 min read
Laravel’s Str::mask: Elegant String Masking Made Simple

Laravel’s Str::mask: Elegant String Masking Made Simple

1
Comments 4
2 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
ă‚“, and?

ă‚“, and?

4
Comments
4 min read
Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

Evaluation Methodology of AI Systems through Agglutinative Languages on AWS Bedrock

1
Comments 1
3 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management

1
Comments
6 min read
Rumbo AWS Certified Security Specialty. Bitácora de vuelo de una builder - AWS Directory Services y Federation

Rumbo AWS Certified Security Specialty. Bitácora de vuelo de una builder - AWS Directory Services y Federation

Comments
13 min read
Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

1
Comments
6 min read
Five ways ngrokkers 'doglab' gateways for homelabs and side projects

Five ways ngrokkers 'doglab' gateways for homelabs and side projects

3
Comments
3 min read
Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

Ethical Hacking and Bug Bounty Programs: Building a Safer Digital Future

6
Comments
3 min read
The deceptive simplicity of auth

The deceptive simplicity of auth

2
Comments
3 min read
Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

Bringing AI Agents to CI/CD: Using ToolHive and Buildkite to Bring Intelligence to Vulnerability Scanning

2
Comments
4 min read
When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025

1
Comments
8 min read
Security isn't a feature. It's a mindset.

Security isn't a feature. It's a mindset.

6
Comments
1 min read
Recovering Locked S3 Buckets in AWS Organizations using Assume Root

Recovering Locked S3 Buckets in AWS Organizations using Assume Root

2
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.