DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI Undressing Underage Girls - A Billion Dollar Industry

AI Undressing Underage Girls - A Billion Dollar Industry

8
Comments
6 min read
Best Practices for Mastering Cloud Security on AWS

Best Practices for Mastering Cloud Security on AWS

Comments
1 min read
HTTP/2 Hypercorn Configuration for your FastAPI

HTTP/2 Hypercorn Configuration for your FastAPI

Comments
11 min read
Man-in-the-Middle Attacks Explained (And How to Stay Safe)

Man-in-the-Middle Attacks Explained (And How to Stay Safe)

7
Comments
3 min read
Eyes Wide Shut

Eyes Wide Shut

4
Comments
16 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

9
Comments 2
5 min read
My Recent Debugging Adventure: The Case of the Disappearing Stylesheets

My Recent Debugging Adventure: The Case of the Disappearing Stylesheets

1
Comments
3 min read
Your Wildcard SSL Setup is a Security Nightmare (And You Don't Even Know It)

Your Wildcard SSL Setup is a Security Nightmare (And You Don't Even Know It)

2
Comments
4 min read
Outil de Cybersécurité du Jour - Sep 5, 2025

Outil de Cybersécurité du Jour - Sep 5, 2025

5
Comments
3 min read
Vulnerability Management Platforms: 8 New Tools for Enterprise-Scale Risk Assessment with Real-World Impact

Vulnerability Management Platforms: 8 New Tools for Enterprise-Scale Risk Assessment with Real-World Impact

2
Comments
8 min read
Cloud Security Posture Management: 5 Cutting-Edge CSPM Solutions Solving Multi-Cloud Compliance and Drift Nightmares

Cloud Security Posture Management: 5 Cutting-Edge CSPM Solutions Solving Multi-Cloud Compliance and Drift Nightmares

3
Comments
8 min read
How to Secure Your Headless WordPress & WPGraphQL API

How to Secure Your Headless WordPress & WPGraphQL API

Comments
3 min read
RAG Firewall: The missing retrieval-time security layer for LLMs (v0.4.1)

RAG Firewall: The missing retrieval-time security layer for LLMs (v0.4.1)

Comments
2 min read
Securing Your Data in PostgreSQL Using PG_TDE for Encryption – Beginner-Friendly Guide

Securing Your Data in PostgreSQL Using PG_TDE for Encryption – Beginner-Friendly Guide

Comments
7 min read
PKI 101: Why Public Key Infrastructure matters

PKI 101: Why Public Key Infrastructure matters

3
Comments
6 min read
When 'Helpful' Robots Go Haywire: A Subtle Security Threat

When 'Helpful' Robots Go Haywire: A Subtle Security Threat

1
Comments
2 min read
Infrastructure as Code Security: 6 Cutting-Edge Tools That Actually Catch Template Vulnerabilities Before They Wreck Your...

Infrastructure as Code Security: 6 Cutting-Edge Tools That Actually Catch Template Vulnerabilities Before They Wreck Your...

1
Comments
9 min read
Mastering Linux Ecosystem Flux: Navigating Kernel Updates, Distribution Upgrades, and Enterprise Adoption with Confidence

Mastering Linux Ecosystem Flux: Navigating Kernel Updates, Distribution Upgrades, and Enterprise Adoption with Confidence

5
Comments
7 min read
Oops... I Locked Myself Out with UFW - Here's How I Fixed It

Oops... I Locked Myself Out with UFW - Here's How I Fixed It

2
Comments
5 min read
That Time I Found a Service Account Token in my Log Files

That Time I Found a Service Account Token in my Log Files

3
Comments
5 min read
Fortifying Your DevOps Pipeline: 6 Cutting-Edge Container Registries Revolutionising Secure Image Management

Fortifying Your DevOps Pipeline: 6 Cutting-Edge Container Registries Revolutionising Secure Image Management

5
Comments
9 min read
Troubleshooting Broken Object Level Authorization

Troubleshooting Broken Object Level Authorization

5
Comments
13 min read
Controlling and Securing Azure Storage Access: A Step-by-Step Guide

Controlling and Securing Azure Storage Access: A Step-by-Step Guide

1
Comments
5 min read
Block Spam Signups with Zuplo and Your Identity Providers

Block Spam Signups with Zuplo and Your Identity Providers

5
Comments
7 min read
Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
loading...