DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your Agent's Identity Now Belongs to Meta. Here's the Open Alternative.

Your Agent's Identity Now Belongs to Meta. Here's the Open Alternative.

1
Comments
3 min read
Anatomy of the Solv Protocol Hack: How ERC-3525 Reentrancy Drained $2.7M

Anatomy of the Solv Protocol Hack: How ERC-3525 Reentrancy Drained $2.7M

Comments
4 min read
Remediating Critical Security Vulnerabilities in Outdated .NET Application Within One Week for Audit Compliance

Remediating Critical Security Vulnerabilities in Outdated .NET Application Within One Week for Audit Compliance

1
Comments
15 min read
The UK Government Just Warned About Vibe Coding Security at RSA. Two Days Later, a Supply Chain Attack Proved Why.

The UK Government Just Warned About Vibe Coding Security at RSA. Two Days Later, a Supply Chain Attack Proved Why.

1
Comments
4 min read
The Third Reason for Edge AI: Law

The Third Reason for Edge AI: Law

Comments
5 min read
EPSS Explained: Why Exploit Prediction Scoring Changes Everything for Vulnerability Prioritization

EPSS Explained: Why Exploit Prediction Scoring Changes Everything for Vulnerability Prioritization

Comments
2 min read
The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins

The Era of "Short-Lived" SSL Certificates: A New Chapter in Web Security Begins

Comments
2 min read
How to Securely Store and Use API Keys in Laravel in 2026

How to Securely Store and Use API Keys in Laravel in 2026

1
Comments
3 min read
Google paid me $15,000 for this Prompt Injection bug.

Google paid me $15,000 for this Prompt Injection bug.

1
Comments
3 min read
I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

I Built a Gmail Spoof Detector That Catches Unicode Homoglyph Phishing

1
Comments
2 min read
Ditch `authorized_keys` Sprawl: SSH User Certificates with OpenSSH CA (Practical Linux Guide)

Ditch `authorized_keys` Sprawl: SSH User Certificates with OpenSSH CA (Practical Linux Guide)

Comments
4 min read
Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)

Understanding OAuth2 Flow with a Complete Java Servlet Demo (Step-by-Step)

Comments
7 min read
Forging the Unforgivable: How a zkSNARK Verification Key Misconfiguration Drained $2.26M from FOOMCASH

Forging the Unforgivable: How a zkSNARK Verification Key Misconfiguration Drained $2.26M from FOOMCASH

Comments
6 min read
One request looks clean. Five requests leak your AWS key.

One request looks clean. Five requests leak your AWS key.

Comments
5 min read
Python 3 & Security: A Deep-Dive Tutorial

Python 3 & Security: A Deep-Dive Tutorial

1
Comments
43 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.