DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
CORS: Understanding Cross-Origin Resource Sharing

CORS: Understanding Cross-Origin Resource Sharing

Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

Comments
2 min read
How to Protect the SafeLine Management Interface

How to Protect the SafeLine Management Interface

5
Comments
1 min read
💀 MaskGod: The Final Boss of URL Masking 🕶️

💀 MaskGod: The Final Boss of URL Masking 🕶️

12
Comments 4
2 min read
Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

11
Comments 4
11 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
leftpad, vibe-coding e o mercado que corta custos a qualquer custo

leftpad, vibe-coding e o mercado que corta custos a qualquer custo

1
Comments
3 min read
MCP Security: Tr-tr-tr-tricky, tricky, tricky

MCP Security: Tr-tr-tr-tricky, tricky, tricky

12
Comments 1
4 min read
Cursor AI Security - Deep Dive into Risk, Policy, and Practice

Cursor AI Security - Deep Dive into Risk, Policy, and Practice

6
Comments 2
4 min read
Drosera HandBook: The ABC of Traps

Drosera HandBook: The ABC of Traps

5
Comments
13 min read
The Inevitable Decay: How Long Before an Unpatched Kubernetes Cluster Becomes Critically Vulnerable?

The Inevitable Decay: How Long Before an Unpatched Kubernetes Cluster Becomes Critically Vulnerable?

6
Comments 1
3 min read
JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers

JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers

3
Comments 2
5 min read
Authentication in Express Using JWT (JSON Web Tokens)

Authentication in Express Using JWT (JSON Web Tokens)

1
Comments 2
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.