DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

Comments
5 min read
I Made NR34P3R: Fast Multi-Threaded Port Scanner for Detecting Open Ports & Services

I Made NR34P3R: Fast Multi-Threaded Port Scanner for Detecting Open Ports & Services

Comments
2 min read
I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

Comments
2 min read
When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

Comments
3 min read
🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

12
Comments 2
3 min read
Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Comments 1
5 min read
Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Comments
4 min read
AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

1
Comments 1
4 min read
Introduction to IAM in Oracle Cloud Infrastructure

Introduction to IAM in Oracle Cloud Infrastructure

6
Comments 2
3 min read
The Ultimate Guide to SSH Hardening: Secure Your Remote Access

The Ultimate Guide to SSH Hardening: Secure Your Remote Access

1
Comments
4 min read
Security news weekly round-up - 20th June 2025

Security news weekly round-up - 20th June 2025

1
Comments
5 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

Navigating the Blockchain Trilemma: Decentralization, Scalability, and Security

2
Comments 1
4 min read
Secure .NET App with Google Authentication (Step-by-Step)

Secure .NET App with Google Authentication (Step-by-Step)

1
Comments
4 min read
Flutter Security: Top Best Practices

Flutter Security: Top Best Practices

Comments
6 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
What’s Happening Inside Your Linux Kernel?

What’s Happening Inside Your Linux Kernel?

6
Comments
4 min read
Secure CI/CD 2025: How I Harden GitLab at Scale

Secure CI/CD 2025: How I Harden GitLab at Scale

Comments
1 min read
Day 11 : FastAPI Auth: Login with JWT & Route Protection

Day 11 : FastAPI Auth: Login with JWT & Route Protection

2
Comments
6 min read
Specter-AAL

Specter-AAL

3
Comments
2 min read
Real-Time API Token Leak Detection & Response with Python

Real-Time API Token Leak Detection & Response with Python

Comments
1 min read
Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Comments
3 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
WordPress Roles & Capabilities: A Practical Guide

WordPress Roles & Capabilities: A Practical Guide

Comments
1 min read
loading...