DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Fake Job Offers Are Turning GitHub Repos Into a Trap

Fake Job Offers Are Turning GitHub Repos Into a Trap

3
Comments
5 min read
Security news weekly round-up - 11th July 2025

Security news weekly round-up - 11th July 2025

1
Comments
3 min read
2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

10
Comments
5 min read
2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

10
Comments
7 min read
⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators

⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators

12
Comments
3 min read
Setting up an airgapped LLM using Ollama

Setting up an airgapped LLM using Ollama

3
Comments
4 min read
How LayerX Achieves “Painless” Governance and Security 🛡️ in the Cloud ☁️

How LayerX Achieves “Painless” Governance and Security 🛡️ in the Cloud ☁️

6
Comments
4 min read
The Telegram Username Scam: How People Are Losing Thousands in TON

The Telegram Username Scam: How People Are Losing Thousands in TON

10
Comments 10
7 min read
The World's Largest Disposable Email Domain List – How We Keep It Updated

The World's Largest Disposable Email Domain List – How We Keep It Updated

6
Comments 1
2 min read
The Lazarus Hackers: Everything You Know Is a Lie

The Lazarus Hackers: Everything You Know Is a Lie

6
Comments
5 min read
🔐 Secure Web Application Flow with JWT: From Frontend to Backend

🔐 Secure Web Application Flow with JWT: From Frontend to Backend

1
Comments
2 min read
How Leading Decentralised Exchanges Secure Private Keys: A Deep Dive

How Leading Decentralised Exchanges Secure Private Keys: A Deep Dive

1
Comments
2 min read
Building Secure AI Apps: Defending Features, Protecting Costs and Staying Ahead of Attacks

Building Secure AI Apps: Defending Features, Protecting Costs and Staying Ahead of Attacks

4
Comments 1
4 min read
A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

A Complete Overview of Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)

1
Comments 2
11 min read
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous

MCP Deep Dive: the Great, the Broken, and the Downright Dangerous

4
Comments
12 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.