DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)

Shellfirm: Your Terminal's New Best Friend (and Accidental Data Loss Savior!)

Comments
2 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

Comments
1 min read
Beware of Interview Scams!

Beware of Interview Scams!

1
Comments 1
3 min read
Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Phantom DNS Query to GCP VM Metadata Service in My AWS Workload 👻 — Revealed by Route 53 Resolver Logging 🔍

Comments
6 min read
Hacked Without Touching Your Phone!

Hacked Without Touching Your Phone!

6
Comments
3 min read
Fail-Safe PII Redaction in Elixir

Fail-Safe PII Redaction in Elixir

2
Comments 1
3 min read
What is a WAF? Why and When Do You Need a WAF?

What is a WAF? Why and When Do You Need a WAF?

8
Comments
2 min read
Adding HTTPS to django app on VM(Windows OS) Production level

Adding HTTPS to django app on VM(Windows OS) Production level

Comments
1 min read
How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

How Secure Is Your Smartphone? 5 Simple Ways to Protect Your Mobile Device

Comments
2 min read
EnvShare - A secured, Role-based Access way to share .env file

EnvShare - A secured, Role-based Access way to share .env file

14
Comments 1
2 min read
Lubyc: Your Ultimate AI Business Platform in 2025

Lubyc: Your Ultimate AI Business Platform in 2025

Comments
2 min read
Security news weekly round-up - 25th April 2025

Security news weekly round-up - 25th April 2025

2
Comments
3 min read
Create AES on C/JAVA || Forward S-box (first part)

Create AES on C/JAVA || Forward S-box (first part)

20
Comments 2
4 min read
Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

1
Comments
3 min read
Useful Sites for Privacy and Security

Useful Sites for Privacy and Security

Comments
3 min read
Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Comments
3 min read
Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Comments
2 min read
JWT Tokens: Secure Your APIs Like a Pro

JWT Tokens: Secure Your APIs Like a Pro

3
Comments 3
8 min read
The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

Comments
4 min read
Navigating the Maze: A Guide to Essential Information Security Standards

Navigating the Maze: A Guide to Essential Information Security Standards

Comments
2 min read
How I Use AI Agents Without Compromising Code Quality & Security

How I Use AI Agents Without Compromising Code Quality & Security

2
Comments
2 min read
Software Testing - Manual Testing ,Levels,Types

Software Testing - Manual Testing ,Levels,Types

Comments
4 min read
Which LLMs Are (and Aren't) Ready for Secure Code?

Which LLMs Are (and Aren't) Ready for Secure Code?

20
Comments
3 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
loading...