DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Trusted Publishers: Making Package Publishing Safer – What You Need to Know

Trusted Publishers: Making Package Publishing Safer – What You Need to Know

Comments
5 min read
Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

15
Comments 13
8 min read
Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

3
Comments
6 min read
Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Comments
3 min read
Integrating Kyverno CLI into CI/CD Pipelines with GitHub Actions

Integrating Kyverno CLI into CI/CD Pipelines with GitHub Actions

Comments
4 min read
Why We Used a Data Gateway to Connect On-Prem SQL with Microsoft Fabric

Why We Used a Data Gateway to Connect On-Prem SQL with Microsoft Fabric

Comments
2 min read
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

1
Comments
10 min read
🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

4
Comments
3 min read
Mastering Role-Based Access Control in Your Javascript CMS

Mastering Role-Based Access Control in Your Javascript CMS

3
Comments
6 min read
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

18
Comments 2
9 min read
Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Comments
3 min read
What if we improve the way developers are given access to databases

What if we improve the way developers are given access to databases

Comments
4 min read
Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Comments
2 min read
HTML Decode vs HTML Encode – Complete Guide

HTML Decode vs HTML Encode – Complete Guide

1
Comments
2 min read
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

8
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.