DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 16 — Authentication Between Services (The Dragon-Archer's Question)

Day 16 — Authentication Between Services (The Dragon-Archer's Question)

3
Comments
2 min read
Splunk Basics

Splunk Basics

1
Comments
4 min read
Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Comments
2 min read
Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Comments
3 min read
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

Comments
7 min read
Tutorial: How to Detect VPNs and Tor Users in Node.js Express

Tutorial: How to Detect VPNs and Tor Users in Node.js Express

Comments
3 min read
Form Security Best Practices: Protecting Your Web Forms from Attacks

Form Security Best Practices: Protecting Your Web Forms from Attacks

Comments
14 min read
When a seemingly innoffensive conversation with AI turns malicious

When a seemingly innoffensive conversation with AI turns malicious

Comments
2 min read
Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Comments
5 min read
Chatbot Rate Limiting: Prevent Abuse and Save Costs

Chatbot Rate Limiting: Prevent Abuse and Save Costs

Comments
12 min read
Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear

Technical Deep Dive: How React Server Components Work and Where the Vulnerabilities Appear

Comments 1
4 min read
Securing AI Agents in the Vercel AI SDK

Securing AI Agents in the Vercel AI SDK

Comments
3 min read
Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites

Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites

Comments
2 min read
Threat Modelling | THM Write-Up

Threat Modelling | THM Write-Up

Comments
6 min read
How to stop OpenAI API credit draining using Client-Side Proof of Work (Node + React)

How to stop OpenAI API credit draining using Client-Side Proof of Work (Node + React)

2
Comments
2 min read
Create Figma Access Token

Create Figma Access Token

Comments
1 min read
# 🔐 Login Backend with Express, AWS Lambda and Dynamo DB

# 🔐 Login Backend with Express, AWS Lambda and Dynamo DB

Comments
4 min read
Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)

Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)

Comments
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
Securing Gmail AI Agents against Prompt Injection with Model Armor

Securing Gmail AI Agents against Prompt Injection with Model Armor

1
Comments
7 min read
Shipping a Landing Page Without Regrets: Security, Privacy, and Reliability for Real Humans

Shipping a Landing Page Without Regrets: Security, Privacy, and Reliability for Real Humans

Comments
6 min read
Create GitLab Access Token

Create GitLab Access Token

Comments
1 min read
Building a Simple, Secure File Upload System with AWS Lambda and S3

Building a Simple, Secure File Upload System with AWS Lambda and S3

Comments
2 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
Building a Privacy-Preserving Voting App

Building a Privacy-Preserving Voting App

Comments
1 min read
loading...