DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited

Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited

Comments
1 min read
Recovering Locked S3 Buckets in AWS Organizations using Assume Root

Recovering Locked S3 Buckets in AWS Organizations using Assume Root

2
Comments
4 min read
Outil de Cybersécurité du Jour - Aug 17, 2025

Outil de Cybersécurité du Jour - Aug 17, 2025

1
Comments
3 min read
🎯 Cracking Cyfrin's NFT Challenge: Guessing Pseudo-Randomness Like a Pro

🎯 Cracking Cyfrin's NFT Challenge: Guessing Pseudo-Randomness Like a Pro

1
Comments
7 min read
MCP Vulnerabilities Every Developer Should Know

MCP Vulnerabilities Every Developer Should Know

33
Comments 1
12 min read
Breaking: The Payment API Revolution is Here (and it's passwordless) 🔐

Breaking: The Payment API Revolution is Here (and it's passwordless) 🔐

30
Comments
4 min read
GitHub Repo Security: Your Easy Go-To Checklist

GitHub Repo Security: Your Easy Go-To Checklist

1
Comments
3 min read
100 Days of DevOps: Day 13

100 Days of DevOps: Day 13

2
Comments
3 min read
Azure Function App Authentication

Azure Function App Authentication

Comments
1 min read
Secure, Self-Hosted AI Code Review Powered by Ollama

Secure, Self-Hosted AI Code Review Powered by Ollama

15
Comments 1
6 min read
WTF is Confidential Computing?

WTF is Confidential Computing?

3
Comments
2 min read
Networking Series 8: Access S3 from a VPC

Networking Series 8: Access S3 from a VPC

Comments
4 min read
Security news weekly round-up - 15th August 2025

Security news weekly round-up - 15th August 2025

2
Comments 1
3 min read
AWS S3 Security Best Practices: A Complete Guide for 2025

AWS S3 Security Best Practices: A Complete Guide for 2025

2
Comments
3 min read
Protect Your Python Secrets Like a Pro with PyShield-Secure

Protect Your Python Secrets Like a Pro with PyShield-Secure

Comments
1 min read
Seccomp in Docker: Advanced System Call Filtering for a Hardened Container Runtime

Seccomp in Docker: Advanced System Call Filtering for a Hardened Container Runtime

Comments
4 min read
Creating a extremely secure hacker-proof system

Creating a extremely secure hacker-proof system

3
Comments
4 min read
JWE vs JWT — Side-by-Side for Developers

JWE vs JWT — Side-by-Side for Developers

Comments 1
2 min read
Which Browser Is Actually Safe for Privacy? (Test Results)

Which Browser Is Actually Safe for Privacy? (Test Results)

Comments
2 min read
Why Generative AI is a Double-Edged Sword for Enterprise Security.

Why Generative AI is a Double-Edged Sword for Enterprise Security.

1
Comments
2 min read
Prevent Website Scraping: Protect Your Content From Bots

Prevent Website Scraping: Protect Your Content From Bots

Comments
10 min read
AWS Cloud Path Week 16: AWS Networking Workshop Part 6 (Final) -Understanding AWS Gateway Load Balancer

AWS Cloud Path Week 16: AWS Networking Workshop Part 6 (Final) -Understanding AWS Gateway Load Balancer

2
Comments
3 min read
Networking Series 7: VPC Monitoring with Flow Logs

Networking Series 7: VPC Monitoring with Flow Logs

Comments
4 min read
What is JWKS? JSON Web Key Set — Short Guide

What is JWKS? JSON Web Key Set — Short Guide

Comments
5 min read
Is Legally Non-Compliant Behavior a Security Vulnerability?

Is Legally Non-Compliant Behavior a Security Vulnerability?

Comments
2 min read
loading...