DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Private LLM Inference: Democratizing AI with Ciphertext Computations

Private LLM Inference: Democratizing AI with Ciphertext Computations

1
Comments
2 min read
Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan

Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan

1
Comments
2 min read
The Dark Reality of Open Source: Why Developers Must Rethink 'Free Software'

The Dark Reality of Open Source: Why Developers Must Rethink 'Free Software'

1
Comments
3 min read
30D2R - August: Active Directory

30D2R - August: Active Directory

Comments
3 min read
Audio Deepfakes: The Achilles' Heel of AI Voice Security by Arvind Sundararajan

Audio Deepfakes: The Achilles' Heel of AI Voice Security by Arvind Sundararajan

1
Comments
2 min read
Stop leaking .env files - try Secretsnap (free CLI)

Stop leaking .env files - try Secretsnap (free CLI)

6
Comments 1
1 min read
Sentinel Chip: Real-Time AI Defense Against Embedded System Attacks

Sentinel Chip: Real-Time AI Defense Against Embedded System Attacks

1
Comments
2 min read
Outil de Cybersécurité du Jour - Aug 31, 2025

Outil de Cybersécurité du Jour - Aug 31, 2025

1
Comments
3 min read
Unlocking LLMs: Secure, Efficient Inference for Everyone

Unlocking LLMs: Secure, Efficient Inference for Everyone

1
Comments
2 min read
Bug Bounty Dex223

Bug Bounty Dex223

Comments
3 min read
Compliance in the Cloud Isn’t a Checkbox

Compliance in the Cloud Isn’t a Checkbox

Comments
2 min read
Part 4: GPU Security and Isolation

Part 4: GPU Security and Isolation

1
Comments
1 min read
Secure Coding guidelines

Secure Coding guidelines

2
Comments
4 min read
Por que criptografar senhas é fundamental no desenvolvimento de software?

Por que criptografar senhas é fundamental no desenvolvimento de software?

Comments
3 min read
Commix: Your New Secret Weapon for Command Injection Vulnerability Hunting

Commix: Your New Secret Weapon for Command Injection Vulnerability Hunting

Comments
2 min read
Android Security Misconfigurations: Key Findings and Recommendations for Clients

Android Security Misconfigurations: Key Findings and Recommendations for Clients

Comments
3 min read
Stop Leaking Your Secrets! Secure Your Node.js Environment Variables.

Stop Leaking Your Secrets! Secure Your Node.js Environment Variables.

1
Comments
3 min read
Kubernetes Security Tools: 7 New Platforms for Container Runtime Protection That Actually Work in Production

Kubernetes Security Tools: 7 New Platforms for Container Runtime Protection That Actually Work in Production

4
Comments
8 min read
Outil de Cybersécurité du Jour - Aug 30, 2025

Outil de Cybersécurité du Jour - Aug 30, 2025

Comments
3 min read
Critical Vulneribilty on Docker Desktop

Critical Vulneribilty on Docker Desktop

Comments
1 min read
Stealth Mode for Smart Factories: Protecting Machine Code with Adaptive AI

Stealth Mode for Smart Factories: Protecting Machine Code with Adaptive AI

5
Comments
2 min read
WTF is End-to-End Encryption?

WTF is End-to-End Encryption?

1
Comments
3 min read
Production Ready VPS in Minutes

Production Ready VPS in Minutes

3
Comments
3 min read
Docker Series: Episode 12 — Docker Security — Protect Your Images, Containers & Secrets 🔒

Docker Series: Episode 12 — Docker Security — Protect Your Images, Containers & Secrets 🔒

7
Comments
2 min read
Introducing Apollo, Setting a New Record in Voice Deepfake Detection Accuracy

Introducing Apollo, Setting a New Record in Voice Deepfake Detection Accuracy

2
Comments
4 min read
loading...