DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Directory Traversal Attacks

Directory Traversal Attacks

Comments
5 min read
Security news weekly round-up - 5th December 2025

Security news weekly round-up - 5th December 2025

2
Comments
3 min read
Building a "Fortress" Kubernetes Cluster: Talos Linux, Proxmox, and Network Isolation

Building a "Fortress" Kubernetes Cluster: Talos Linux, Proxmox, and Network Isolation

4
Comments 1
4 min read
The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

Comments
2 min read
I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)

I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)

1
Comments
7 min read
Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Comments
3 min read
Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles

Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles

Comments
2 min read
Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic

Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic

Comments 1
130 min read
OAuth 2.0 Deep Dive — From Textbook Diagrams to Production-Ready Authorization

OAuth 2.0 Deep Dive — From Textbook Diagrams to Production-Ready Authorization

5
Comments
10 min read
Role Based Access Control in SeaORM 2.0

Role Based Access Control in SeaORM 2.0

1
Comments
9 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
Security Disclosure of Vulnerabilities: CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588

Security Disclosure of Vulnerabilities: CVE-2025-3930, CVE-2025-53092, CVE-2025-25298, CVE-2024-56143, and CVE-2024-52588

3
Comments
7 min read
How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)

How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)

Comments
3 min read
Disable antivirus real-time monitoring with PowerShell

Disable antivirus real-time monitoring with PowerShell

Comments
1 min read
Digital Vaults: Unlocking the Future of Data Archiving with Cutting-Edge Databases

Digital Vaults: Unlocking the Future of Data Archiving with Cutting-Edge Databases

Comments
2 min read
Part 3 of My First .NET Core Web API Project: Documenting the Rookie Mistakes and Wins on the Way to a Job.

Part 3 of My First .NET Core Web API Project: Documenting the Rookie Mistakes and Wins on the Way to a Job.

Comments
3 min read
Why is authN and AuthZ still the hardest part of building solo?

Why is authN and AuthZ still the hardest part of building solo?

Comments
1 min read
Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps

Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps

3
Comments
2 min read
Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

1
Comments
2 min read
Hello Dev Community

Hello Dev Community

Comments
1 min read
🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

Comments
3 min read
🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

Comments
3 min read
Secure your VPC with AWS Network Firewall

Secure your VPC with AWS Network Firewall

1
Comments
3 min read
EnvSecOps: The Obviously Painful Path Forward

EnvSecOps: The Obviously Painful Path Forward

Comments
3 min read
Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

4
Comments
6 min read
loading...