DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building Ghostable & Finding Ideas by Listening Well

Building Ghostable & Finding Ideas by Listening Well

4
Comments 2
3 min read
Auth0 for AI Agents is now generally available!

Auth0 for AI Agents is now generally available!

81
Comments 8
3 min read
Eppie, a new open-source cross-platform email client, on Snap Store๐Ÿง

Eppie, a new open-source cross-platform email client, on Snap Store๐Ÿง

2
Comments
2 min read
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db

Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db

3
Comments
2 min read
How to use authentication using Athentication Kit

How to use authentication using Athentication Kit

Comments
3 min read
Staged vs. Non Staged Payloads

Staged vs. Non Staged Payloads

Comments
3 min read
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

2
Comments 1
6 min read
Engineering Trust in 2025: A Developerโ€™s Field Guide to Credible Information

Engineering Trust in 2025: A Developerโ€™s Field Guide to Credible Information

Comments
5 min read
PGDN Sentinel โ€” an OSS security toolkit for Sui validators, inside Discord

PGDN Sentinel โ€” an OSS security toolkit for Sui validators, inside Discord

Comments
3 min read
Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis

Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis

1
Comments
4 min read
Day 2 โ€” Phishing & Identity Verification (The Typed Letter)

Day 2 โ€” Phishing & Identity Verification (The Typed Letter)

6
Comments
2 min read
Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool โ€“ Part 2: Hybrid AWS RDS Deployment

Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool โ€“ Part 2: Hybrid AWS RDS Deployment

3
Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
Dirty COW exploit that broke linux in 2016

Dirty COW exploit that broke linux in 2016

Comments
2 min read
๐Ÿฆ Day 24 of #30DaysOfSolidity โ€” Build a Secure Conditional Payments (Escrow) System in Solidity

๐Ÿฆ Day 24 of #30DaysOfSolidity โ€” Build a Secure Conditional Payments (Escrow) System in Solidity

Comments
4 min read
Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

1
Comments
16 min read
MVP Conf 2025 - OWASP API Security Top 10

MVP Conf 2025 - OWASP API Security Top 10

Comments
3 min read
I Was Given a โ€œJob Assignmentโ€ That Installed Malware

I Was Given a โ€œJob Assignmentโ€ That Installed Malware

3
Comments
2 min read
WHAT IS A SECRET?

WHAT IS A SECRET?

6
Comments
6 min read
JWT Token Validator Challenge

JWT Token Validator Challenge

2
Comments
8 min read
Security-First WebSockets: Protecting Real-Time Communications

Security-First WebSockets: Protecting Real-Time Communications

3
Comments 2
2 min read
eBPF Tutorial: Privilege Escalation via File Content Manipulation

eBPF Tutorial: Privilege Escalation via File Content Manipulation

Comments
7 min read
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

Comments
5 min read
Create Microsoft OAuth2 API

Create Microsoft OAuth2 API

Comments
1 min read
ABAC with Open Policy Agent (OPA)

ABAC with Open Policy Agent (OPA)

Comments
9 min read
loading...