DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Your Vibe-Coded App is Genius — OR Is It Just What Your OPUS Told You?

Your Vibe-Coded App is Genius — OR Is It Just What Your OPUS Told You?

1
Comments 1
3 min read
Stop uploading sensitive PDFs to random websites

Stop uploading sensitive PDFs to random websites

Comments
2 min read
I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

I built a Windows diagnostic tool in Python to detect RATs, persistence, and suspicious logs

Comments
1 min read
Session-Based Authentication VS Token-Based Authentication

Session-Based Authentication VS Token-Based Authentication

1
Comments
2 min read
Hackers Rob. Security Reads the Manual.

Hackers Rob. Security Reads the Manual.

Comments
3 min read
Security news weekly round-up - 26th December 2025

Security news weekly round-up - 26th December 2025

1
Comments 1
2 min read
Best Practices for Connecting LLMs to SQL Databases

Best Practices for Connecting LLMs to SQL Databases

1
Comments
5 min read
Why I stopped using online JSON formatters (and built my own)

Why I stopped using online JSON formatters (and built my own)

1
Comments
2 min read
Commit Signing - GnuPG Agent Forwarding

Commit Signing - GnuPG Agent Forwarding

Comments
2 min read
How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution

How a Serialization Flaw in React 19 Server Components Led to Remote Code Execution

Comments
3 min read
Data Security Simplified: Building Your HIPAA-Compliant Data Lake on AWS

Data Security Simplified: Building Your HIPAA-Compliant Data Lake on AWS

Comments
3 min read
The Fearless Future

The Fearless Future

Comments
3 min read
Building EncroGram: A Messenger Where Servers Can't Read Your Messages

Building EncroGram: A Messenger Where Servers Can't Read Your Messages

Comments
2 min read
Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java

Beyond CRUD: Designing a Multi-Tenant Data Isolation Architecture in Java

1
Comments
3 min read
😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)

😲 Most People Don’t Know You Can Log In by Copying a Password Hash 🔐 (And Why It’s NOT a Bug)

Comments 1
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.