DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Has Anyone Else Seen a Suspicious Follower Spike Recently?

Has Anyone Else Seen a Suspicious Follower Spike Recently?

15
Comments 15
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
How I Cleaned a Hacked WordPress Database in 5 Minutes

How I Cleaned a Hacked WordPress Database in 5 Minutes

Comments 1
5 min read
🧩 How We Solved “Unable to Get Certificate CRL” in Rails: A Debugging Story

🧩 How We Solved “Unable to Get Certificate CRL” in Rails: A Debugging Story

4
Comments 1
4 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Comments
6 min read
The $440,000 Architecture Mistake: Why Deloitte's AI Failed (And How to Prevent It)

The $440,000 Architecture Mistake: Why Deloitte's AI Failed (And How to Prevent It)

3
Comments
6 min read
Reverse Methods for Obtaining Phone Numbers and Preventive Measures

Reverse Methods for Obtaining Phone Numbers and Preventive Measures

2
Comments
3 min read
What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial

What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial

Comments
2 min read
Congrats to the Winners of the Auth0 for AI Agents Challenge!

Congrats to the Winners of the Auth0 for AI Agents Challenge!

46
Comments 20
2 min read
Unified Authentication and Key Distribution Scheme for Apps Without Human-Device Interaction

Unified Authentication and Key Distribution Scheme for Apps Without Human-Device Interaction

Comments
7 min read
Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Comments
2 min read
Meaning of passwordless authentication for beginners (and let's make it)

Meaning of passwordless authentication for beginners (and let's make it)

2
Comments
3 min read
Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Comments
6 min read
Secrets in .NET: Why Strings Are Not Safe (and What to Do Instead)

Secrets in .NET: Why Strings Are Not Safe (and What to Do Instead)

3
Comments 1
8 min read
Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

1
Comments
5 min read
Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

Comments
2 min read
Gadget chains in Java: how unsafe deserialization leads to RCE?

Gadget chains in Java: how unsafe deserialization leads to RCE?

Comments
11 min read
Top Security Threats in Blockchain

Top Security Threats in Blockchain

1
Comments
6 min read
Docker Registry (Harbor) and Private Repositories

Docker Registry (Harbor) and Private Repositories

1
Comments
5 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

2
Comments
2 min read
HTML Decode vs HTML Encode – Complete Guide

HTML Decode vs HTML Encode – Complete Guide

Comments
2 min read
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

Comments
1 min read
loading...