DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
From AirDrop to Cloud Heist: How North Korea's UNC4899 Stole Millions From a Crypto Firm Through a Single Developer's Mistake

From AirDrop to Cloud Heist: How North Korea's UNC4899 Stole Millions From a Crypto Firm Through a Single Developer's Mistake

Comments
7 min read
Review: Simon Willison's Agentic Engineering Practices Turned Into Testing, Sandboxing, Prompt-Injection, and Secret-Handling...

Review: Simon Willison's Agentic Engineering Practices Turned Into Testing, Sandboxing, Prompt-Injection, and Secret-Handling...

Comments
7 min read
AI in Healthcare Security: What Developers and CTOs Need to Build Right

AI in Healthcare Security: What Developers and CTOs Need to Build Right

Comments
4 min read
JWT Refresh Token Rotation in .NET — Why Your Auth is Probably Broken

JWT Refresh Token Rotation in .NET — Why Your Auth is Probably Broken

Comments
4 min read
Authorization Is Not Enforcement: Execution Integrity in Agentic Systems

Authorization Is Not Enforcement: Execution Integrity in Agentic Systems

2
Comments 1
6 min read
What Does a Website Security Score Mean?

What Does a Website Security Score Mean?

Comments
7 min read
Browser Extension Security: The Overlooked Attack Surface Every IT Leader Should Address

Browser Extension Security: The Overlooked Attack Surface Every IT Leader Should Address

1
Comments
6 min read
Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Comments
4 min read
The Liquidation Game: How Whale Traders Are Weaponizing Perp DEX Mechanics to Extract Millions

The Liquidation Game: How Whale Traders Are Weaponizing Perp DEX Mechanics to Extract Millions

Comments
7 min read
Week 9: Fish Shell Functions for Managing AWS EC2 Instances -- Save Time and Billing

Week 9: Fish Shell Functions for Managing AWS EC2 Instances -- Save Time and Billing

Comments
10 min read
Everyone Agrees Agent Identity Is the Problem. Nobody Agrees on the Solution.

Everyone Agrees Agent Identity Is the Problem. Nobody Agrees on the Solution.

1
Comments
3 min read
Evaluating and Improving Proposed Architecture for Production Application Suitability

Evaluating and Improving Proposed Architecture for Production Application Suitability

Comments
14 min read
AI Vendor Lock-In Is Now a National Security Risk

AI Vendor Lock-In Is Now a National Security Risk

Comments
7 min read
How I Built an AI That Breeds Its Own Jailbreaks Using Genetic Algorithms

How I Built an AI That Breeds Its Own Jailbreaks Using Genetic Algorithms

6
Comments 2
3 min read
Cryptography Fundamentals: How Your Data Stays Secret in 2026

Cryptography Fundamentals: How Your Data Stays Secret in 2026

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.