DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Docker Registry (Harbor) and Private Repositories

Docker Registry (Harbor) and Private Repositories

1
Comments
5 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

2
Comments
2 min read
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

Comments
1 min read
BetterAuth Integration with Encore.ts

BetterAuth Integration with Encore.ts

13
Comments
14 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
What is a Prompt Injection Attack

What is a Prompt Injection Attack

1
Comments
2 min read
Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
OWASP Cornucopia 3.0 - A call for card game designers!

OWASP Cornucopia 3.0 - A call for card game designers!

1
Comments
2 min read
The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

Comments
4 min read
Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

1
Comments
6 min read
Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Comments
7 min read
The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.