DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
What is Zero Trust Security?

What is Zero Trust Security?

6
Comments 1
2 min read
Why is GRC Important in 2025?

Why is GRC Important in 2025?

Comments
3 min read
Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
Security news weekly round-up - 3rd January 2025

Security news weekly round-up - 3rd January 2025

1
Comments
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

5
Comments
2 min read
Password Hashing and Data Integrity in Real-World Implementation

Password Hashing and Data Integrity in Real-World Implementation

20
Comments 1
2 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
JavaScript Security Best Practices: Prevent Vulnerabilities | Mbloging

JavaScript Security Best Practices: Prevent Vulnerabilities | Mbloging

Comments
2 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

Comments
3 min read
JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

3
Comments
1 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
loading...