DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding AWS RAM: Benefits and Use Cases

Understanding AWS RAM: Benefits and Use Cases

5
Comments 1
1 min read
From Unknown to Verified: Solving the MCP Server Trust Problem

From Unknown to Verified: Solving the MCP Server Trust Problem

10
Comments
6 min read
Is GitHub Sponsors Safe? A Comprehensive Guide

Is GitHub Sponsors Safe? A Comprehensive Guide

1
Comments
8 min read
Optimizing Docker Images: Reducing Size and Improving Security

Optimizing Docker Images: Reducing Size and Improving Security

3
Comments 1
5 min read
Building a Reverse Shell in Rust Using PEB Techniques

Building a Reverse Shell in Rust Using PEB Techniques

1
Comments
2 min read
Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

3
Comments
4 min read
Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

39
Comments 4
7 min read
Threat Modeling for AI Apps | AI Security series

Threat Modeling for AI Apps | AI Security series

1
Comments
3 min read
Serverless Meets Zero Trust: Designing Secure Cloud-Native Apps from Day One

Serverless Meets Zero Trust: Designing Secure Cloud-Native Apps from Day One

11
Comments 2
6 min read
🐞 Comprehensive Bug Bounty Hunting Methodology

🐞 Comprehensive Bug Bounty Hunting Methodology

2
Comments
32 min read
PKI Demystified: From That Green Lock to Digital Trust

PKI Demystified: From That Green Lock to Digital Trust

1
Comments
4 min read
Why AI Apps Need Security from Day One | AI Security series

Why AI Apps Need Security from Day One | AI Security series

1
Comments
3 min read
AI Hallucinations: Can We Trust AI-Generated Data?

AI Hallucinations: Can We Trust AI-Generated Data?

5
Comments 1
1 min read
Security news weekly round-up - 30th May 2025

Security news weekly round-up - 30th May 2025

1
Comments
4 min read
[SECURITY IN RAILS] Preventing enumeration attacks, data leaks, and timing based attacks 🔐🛤️

[SECURITY IN RAILS] Preventing enumeration attacks, data leaks, and timing based attacks 🔐🛤️

12
Comments 2
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.