DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cipher's Log: Introduction

Cipher's Log: Introduction

Comments
2 min read
Complete Guide to AWS KMS: Encryption, Key Management & Serverless Projects

Complete Guide to AWS KMS: Encryption, Key Management & Serverless Projects

12
Comments
1 min read
The Telegram Username Scam: How People Are Losing Thousands in TON

The Telegram Username Scam: How People Are Losing Thousands in TON

10
Comments 9
7 min read
Building Secure C# Applications: A Comprehensive Guide

Building Secure C# Applications: A Comprehensive Guide

Comments
5 min read
The Risk of Registry Injection Attacks with shadcn

The Risk of Registry Injection Attacks with shadcn

11
Comments 1
3 min read
Sending Email Notifications on SSH Login Events

Sending Email Notifications on SSH Login Events

Comments
2 min read
Spring4Shell Vulnerability: What You Need to Know

Spring4Shell Vulnerability: What You Need to Know

5
Comments
3 min read
A Quiz to Explore AI Safety and Trust-Based Access to Advanced Systems

A Quiz to Explore AI Safety and Trust-Based Access to Advanced Systems

1
Comments
1 min read
Implementing Multi-Factor Authentication in Azure

Implementing Multi-Factor Authentication in Azure

1
Comments
5 min read
NeuroShellOS Privacy Edition — A New Vision for Operating System-Level Privacy

NeuroShellOS Privacy Edition — A New Vision for Operating System-Level Privacy

5
Comments
1 min read
Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Top Cyber Threats Targeting Small and Medium Enterprises (SMEs)

Comments
4 min read
Dissecting Kubewarden: Internals, How It's Built, and Its Place Among Policy Engines

Dissecting Kubewarden: Internals, How It's Built, and Its Place Among Policy Engines

2
Comments
8 min read
MCP 2025-06-18 Spec Update: Security, Structured Output & Elicitation

MCP 2025-06-18 Spec Update: Security, Structured Output & Elicitation

52
Comments 2
11 min read
How I Secured Passwords in My Spring Boot Project (N1netails) Using BCrypt

How I Secured Passwords in My Spring Boot Project (N1netails) Using BCrypt

3
Comments
5 min read
Best Practices for Creating Strong and Secure Passwords

Best Practices for Creating Strong and Secure Passwords

Comments
4 min read
🎲 Python’s random vs secrets — What’s the real difference?

🎲 Python’s random vs secrets — What’s the real difference?

Comments
1 min read
🧭 Selecting the Right Bug Bounty Targets & Reconnaissance

🧭 Selecting the Right Bug Bounty Targets & Reconnaissance

Comments
24 min read
Data at Risk: The Hidden Costs of AI Growth

Data at Risk: The Hidden Costs of AI Growth

6
Comments
3 min read
🛡️ Blocking Admin SSH Logins with SELinux (`ssh_sysadm_login`)

🛡️ Blocking Admin SSH Logins with SELinux (`ssh_sysadm_login`)

Comments
3 min read
🔐What, Why, How, Where, When of AWS CloudHSM...

🔐What, Why, How, Where, When of AWS CloudHSM...

1
Comments
3 min read
How to Create a Local Chatbot Without Coding in Less Than 10 Minutes on AI PCs

How to Create a Local Chatbot Without Coding in Less Than 10 Minutes on AI PCs

51
Comments 20
6 min read
Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Top 10 Cybersecurity Tips for Protecting Your Personal Devices

Comments
3 min read
What Is a DDoS Attack? Causes, Effects, and Prevention Tips

What Is a DDoS Attack? Causes, Effects, and Prevention Tips

Comments
4 min read
Ransomware Explained: How It Works and How to Defend Against It

Ransomware Explained: How It Works and How to Defend Against It

Comments
4 min read
What Is Phishing? Real-Life Examples and Protection Tips

What Is Phishing? Real-Life Examples and Protection Tips

Comments
3 min read
loading...