DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Dev Log #2 - From Scaffolding to First Telemetry

Dev Log #2 - From Scaffolding to First Telemetry

1
Comments
3 min read
The Dark Era of AI: The AI That Could Do Anything

The Dark Era of AI: The AI That Could Do Anything

1
Comments
1 min read
The AI Arms Race: Next-Gen DDoS Attacks & Adaptive Defenses

The AI Arms Race: Next-Gen DDoS Attacks & Adaptive Defenses

Comments
2 min read
Privacy, Data Handling, and Regulatory Compliance in Angular Applications

Privacy, Data Handling, and Regulatory Compliance in Angular Applications

1
Comments
3 min read
Securing Frontend Apps from Lodash Issues

Securing Frontend Apps from Lodash Issues

Comments
3 min read
Smart Mutation: Using AI to Fortify JavaScript Engines

Smart Mutation: Using AI to Fortify JavaScript Engines

1
Comments
2 min read
DeepMind’s CodeMender: Turning Bug Fixes into a Lasting Security Advantage

DeepMind’s CodeMender: Turning Bug Fixes into a Lasting Security Advantage

Comments
1 min read
Understanding Authentication: Methods and Best Practices

Understanding Authentication: Methods and Best Practices

5
Comments
4 min read
Cloud Pen Testing Strategies (Azure, AWS)

Cloud Pen Testing Strategies (Azure, AWS)

2
Comments
5 min read
Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Comments
6 min read
The $440,000 Architecture Mistake: Why Deloitte's AI Failed (And How to Prevent It)

The $440,000 Architecture Mistake: Why Deloitte's AI Failed (And How to Prevent It)

5
Comments
6 min read
Reverse Methods for Obtaining Phone Numbers and Preventive Measures

Reverse Methods for Obtaining Phone Numbers and Preventive Measures

4
Comments
3 min read
Unified Authentication and Key Distribution Scheme for Apps Without Human-Device Interaction

Unified Authentication and Key Distribution Scheme for Apps Without Human-Device Interaction

1
Comments
7 min read
Why Your Authentication Architecture Is Your Biggest Security Blind Spot

Why Your Authentication Architecture Is Your Biggest Security Blind Spot

7
Comments
4 min read
Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Comments
2 min read
Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Comments
6 min read
Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

1
Comments
5 min read
Gadget chains in Java: how unsafe deserialization leads to RCE?

Gadget chains in Java: how unsafe deserialization leads to RCE?

Comments
11 min read
Security news weekly round-up - 10th October 2025

Security news weekly round-up - 10th October 2025

1
Comments
5 min read
AWS Control Tower: Create Your First Landing Zone

AWS Control Tower: Create Your First Landing Zone

Comments
4 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

Smart Fuzzing: How AI is Automating JavaScript Bug Hunts

1
Comments
2 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
loading...