DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What CISOs Get Wrong About AI Risk

What CISOs Get Wrong About AI Risk

Comments
4 min read
What is Post-Quantum Cryptography?

What is Post-Quantum Cryptography?

Comments
11 min read
I Analyzed 5 Famous Hacked Contracts with AI — Here's What It Found

I Analyzed 5 Famous Hacked Contracts with AI — Here's What It Found

Comments
5 min read
Building a Complete Authentication System in Flutter Using Hosteday

Building a Complete Authentication System in Flutter Using Hosteday

Comments
3 min read
Windows RPC Privilege Escalation, AI Supply Chain Breach, & Minecraft Auditing Tool

Windows RPC Privilege Escalation, AI Supply Chain Breach, & Minecraft Auditing Tool

Comments
3 min read
From Audit Findings to Low-Risk Fixes on a Managed WordPress Site

From Audit Findings to Low-Risk Fixes on a Managed WordPress Site

Comments
4 min read
How to Build a Production-Ready Secure Python API (JWT, Rate Limiting, and Caching)

How to Build a Production-Ready Secure Python API (JWT, Rate Limiting, and Caching)

Comments
2 min read
97% Expect a Major AI Agent Incident This Year. Are You in the 3%?

97% Expect a Major AI Agent Incident This Year. Are You in the 3%?

Comments
8 min read
I Built a 100% Serverless, Zero-Log Secure Voice Chat (And Here is Why)

I Built a 100% Serverless, Zero-Log Secure Voice Chat (And Here is Why)

Comments
4 min read
5 Critical Security Vulnerabilities in Python APIs (and How to Fix Them in Production)

5 Critical Security Vulnerabilities in Python APIs (and How to Fix Them in Production)

Comments
2 min read
Why I chose Cybersecurity (and why you might too)

Why I chose Cybersecurity (and why you might too)

Comments 1
1 min read
AI-Generated Auth Code vs Managed Auth Services: A Honest Comparison

AI-Generated Auth Code vs Managed Auth Services: A Honest Comparison

2
Comments
5 min read
Why I stopped rebuilding auth from scratch and built a universal trust layer instead

Why I stopped rebuilding auth from scratch and built a universal trust layer instead

Comments
2 min read
How I handle bulk WHOIS lookups at scale: lessons from running a domain API

How I handle bulk WHOIS lookups at scale: lessons from running a domain API

Comments
4 min read
# Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them

# Supercharging My SOC Pipeline With VirusTotal Enrichment — Know Your Attacker Before You Block Them

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.