DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
WireGuard Explained: A Deep Dive into Modern VPN Technology

WireGuard Explained: A Deep Dive into Modern VPN Technology

Comments
6 min read
"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

Comments
2 min read
WhisperLeak: Unmasking LLM Conversation Topics

WhisperLeak: Unmasking LLM Conversation Topics

Comments
7 min read
Android vs. iOS: Which is Easier for App Development?

Android vs. iOS: Which is Easier for App Development?

Comments
8 min read
How Bluetooth Works: A Technical Deep Dive

How Bluetooth Works: A Technical Deep Dive

Comments
6 min read
How to Prevent Objects from Being Modified in JavaScript

How to Prevent Objects from Being Modified in JavaScript

Comments
2 min read
Beyond Code: The Obsessive Knowledge That Makes You Dangerous

Beyond Code: The Obsessive Knowledge That Makes You Dangerous

Comments
9 min read
Implementing Authentication Middleware in Next.js with i18n Support

Implementing Authentication Middleware in Next.js with i18n Support

Comments
3 min read
Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

2
Comments
17 min read
Day 5 — Environment Drift (The Fog in the Valley)

Day 5 — Environment Drift (The Fog in the Valley)

8
Comments
2 min read
Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Amazon EKS adds native support for the AWS Secrets Store CSI Driver Provider

Comments
1 min read
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

What is Cyber Resilience Act, and what cybersecurity requirements does it impose?

1
Comments
7 min read
Cybersecurity's Funding Paradox: Why It Remains Overlooked

Cybersecurity's Funding Paradox: Why It Remains Overlooked

Comments
7 min read
Key Take-a-Ways From Microsoft Ignite 2025

Key Take-a-Ways From Microsoft Ignite 2025

Comments
4 min read
Evidence of CVE-2025-55182 Exploitation attempts

Evidence of CVE-2025-55182 Exploitation attempts

1
Comments
2 min read
Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Why your `fetch()` request fails on Instagram (and how to fix TLS Fingerprinting)

Comments
2 min read
Hack a Windows System Using PowerShell

Hack a Windows System Using PowerShell

5
Comments
6 min read
Prompt Injection: What Security Managers Need to Know

Prompt Injection: What Security Managers Need to Know

Comments
15 min read
Software Fun-duh-mentals - DNS

Software Fun-duh-mentals - DNS

Comments
3 min read
Why the MITRE ATT&CK Framework Actually Works

Why the MITRE ATT&CK Framework Actually Works

Comments
6 min read
Validate JSON Using PHP

Validate JSON Using PHP

Comments
2 min read
Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

1
Comments
1 min read
AuthController

AuthController

Comments
2 min read
TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

Comments
4 min read
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

1
Comments
20 min read
loading...