DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Prompt Chainmail: Security middleware for AI applications

Prompt Chainmail: Security middleware for AI applications

1
Comments 3
4 min read
Gateway-Oriented Architecture (GOA)

Gateway-Oriented Architecture (GOA)

Comments
3 min read
Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Why Bad Code Review Advice Still Hurts Your Team — and How Context-Driven AI Transforms Reviews

Comments
3 min read
GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

GLM 4.5 vs. Promptfoo: A Playbook for Systematic LLM Security Audits

5
Comments
19 min read
Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Cracking TryHackMe’s “Simple CTF”: SQLi & CVE-2019-9053 in the Wild

Comments
1 min read
Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Logs Fundamentals for Cybersecurity: What Every Analyst Should Know

Comments
10 min read
🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

🚨 The Black Box Era: When Developers No Longer Understand the Code They Deploy

Comments
2 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Comments
3 min read
Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

Multi-Stage Processing Architecture: A Structural Defense Against Prompt Injection

3
Comments 1
8 min read
Security news weekly round-up - 5th September 2025

Security news weekly round-up - 5th September 2025

1
Comments
2 min read
Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust

Building Own Stream Cipher: Part 2 - RC4: From Ubiquity to Collapse and What It Taught Us About Trust

Comments
4 min read
Network Security Tips For Small Business

Network Security Tips For Small Business

Comments
4 min read
Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep

Cloud Resume Challenge - Chunk 0 - Access, Credentials, and Certification Prep

1
Comments
3 min read
How the Tea App Got Hacked: Firebase Pitfalls and Lessons for Engineers

How the Tea App Got Hacked: Firebase Pitfalls and Lessons for Engineers

Comments
8 min read
Is Open Banking Built To Last?

Is Open Banking Built To Last?

23
Comments 1
7 min read
Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs

Building a Cost-Efficient Game Launcher with AWS Pre-Signed URLs

Comments 1
5 min read
OneTerm: The Open-Source Bastion Host I Refactored in Three Months

OneTerm: The Open-Source Bastion Host I Refactored in Three Months

Comments
3 min read
What NISTIR 8286 Really Means for Your Team

What NISTIR 8286 Really Means for Your Team

Comments
2 min read
Using NISTIR 8286 Without the Jargon

Using NISTIR 8286 Without the Jargon

Comments
2 min read
NISTIR 8286 Explained Like You’re Not an Expert

NISTIR 8286 Explained Like You’re Not an Expert

Comments
2 min read
NISTIR 8286 Makes Cybersecurity Easier to Understand and Manage

NISTIR 8286 Makes Cybersecurity Easier to Understand and Manage

Comments
2 min read
Why NISTIR 8286 Matters for Cybersecurity and Business Teams

Why NISTIR 8286 Matters for Cybersecurity and Business Teams

Comments
2 min read
How Developers Can Use NISTIR 8286 to Improve Risk Visibility

How Developers Can Use NISTIR 8286 to Improve Risk Visibility

Comments
2 min read
Dev-Friendly NISTIR 8286 Guide for Cyber & Enterprise Risk

Dev-Friendly NISTIR 8286 Guide for Cyber & Enterprise Risk

Comments
2 min read
Review of CWE-843 Type Confusion Vulnerability and Exploit

Review of CWE-843 Type Confusion Vulnerability and Exploit

Comments
6 min read
loading...