DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

Shadow API Risks: The Hidden Cybersecurity Threat Most U.S. Small Businesses Miss

3
Comments
2 min read
SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

SeeTheSharpFlag — Hack The Box Mobile Challenge Write-up

Comments
2 min read
GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

GHSA-6QR9-G2XW-CW92: Dagu: The Friendly Ghost that Runs Your Malware (GHSA-6QR9-G2XW-CW92)

Comments
2 min read
AgentGate vs. Building Your Own AI Agent Security Layer: An Honest Comparison

AgentGate vs. Building Your Own AI Agent Security Layer: An Honest Comparison

Comments
6 min read
Kyverno for Kubernetes Policies

Kyverno for Kubernetes Policies

1
Comments
7 min read
Container Image Scanning in 2026: Clair vs Trivy vs Grype

Container Image Scanning in 2026: Clair vs Trivy vs Grype

Comments
5 min read
AI Guardrails Across the Enterprise Stack

AI Guardrails Across the Enterprise Stack

Comments
3 min read
Is Your Node.js App Quantum-Safe? Tracing PQC in TLS Connections

Is Your Node.js App Quantum-Safe? Tracing PQC in TLS Connections

Comments
7 min read
🦀 Rust Weekly Log — CRC, Entropy, and Hexagonal Architecture

🦀 Rust Weekly Log — CRC, Entropy, and Hexagonal Architecture

Comments
1 min read
Security news weekly round-up - 20th February 2026

Security news weekly round-up - 20th February 2026

Comments
4 min read
CrowdStrike Just Wrote a Threat Brief About AI Agents. Cisco Published a 2026 Report. Here's What You Can Do About It Today.

CrowdStrike Just Wrote a Threat Brief About AI Agents. Cisco Published a 2026 Report. Here's What You Can Do About It Today.

Comments
3 min read
Who fixes the zero-days AI finds in abandoned software?

Who fixes the zero-days AI finds in abandoned software?

Comments
5 min read
Your Logs Are a Security Risk — 6 Patterns That Leak PII

Your Logs Are a Security Risk — 6 Patterns That Leak PII

Comments
2 min read
How OpenClaw Handles Agent Identity Today (It Doesn't) And How to Fix It

How OpenClaw Handles Agent Identity Today (It Doesn't) And How to Fix It

Comments
5 min read
How mcpwall Maps to the OWASP MCP Top 10

How mcpwall Maps to the OWASP MCP Top 10

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.