DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Modern AppSec Needs Location-Aware Security Testing

Why Modern AppSec Needs Location-Aware Security Testing

Comments
4 min read
How Piracy and Cheating Kill Revenue for Indie Games

How Piracy and Cheating Kill Revenue for Indie Games

1
Comments
5 min read
# I built an Encrypted Vault for .env files inside VS Code

# I built an Encrypted Vault for .env files inside VS Code

Comments 3
2 min read
How to Configure Asymmetric JWTs on Self-Hosted Supabase

How to Configure Asymmetric JWTs on Self-Hosted Supabase

1
Comments 1
3 min read
Auditly - Enterprise Python Dependency Vulnerability Scanner

Auditly - Enterprise Python Dependency Vulnerability Scanner

Comments
3 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
Secure MCP Development with Python and Gemini CLI

Secure MCP Development with Python and Gemini CLI

9
Comments
7 min read
Obfuscated JavaScript Credit Card Stealer

Obfuscated JavaScript Credit Card Stealer

Comments
3 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
Lock N' Key : The Developer's Vault

Lock N' Key : The Developer's Vault

Comments
2 min read
AES vs ChaCha20: Explained While Building Real Crypto Tools

AES vs ChaCha20: Explained While Building Real Crypto Tools

Comments
2 min read
Segurança de Banco de Dados na visão Blue Team: Muito além do comando GRANT

Segurança de Banco de Dados na visão Blue Team: Muito além do comando GRANT

5
Comments 2
6 min read
PHP file upload example!

PHP file upload example!

Comments
2 min read
Ditching the Access Key: Implementing IAM Roles Anywhere for Secure Edge and On-Prem Workloads

Ditching the Access Key: Implementing IAM Roles Anywhere for Secure Edge and On-Prem Workloads

Comments
3 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.