DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I built a Python deobfuscator using AST transformers - Noctyra

I built a Python deobfuscator using AST transformers - Noctyra

Comments
1 min read
Two Supply Chain Attacks in Two Weeks - Why Defense-in-Depth Saved Me

Two Supply Chain Attacks in Two Weeks - Why Defense-in-Depth Saved Me

Comments
5 min read
Handling Sensitive UI Data in React Native: Practical Approaches Across iOS and Android

Handling Sensitive UI Data in React Native: Practical Approaches Across iOS and Android

Comments
2 min read
Post-Mortem: The March 2026 Axios Supply Chain Attack

Post-Mortem: The March 2026 Axios Supply Chain Attack

Comments
2 min read
Terraform Security Best Practices: Encryption, IAM, and Drift Detection

Terraform Security Best Practices: Encryption, IAM, and Drift Detection

Comments
14 min read
End-to-end TLS for public-domain tunnels, without trusting the relay

End-to-end TLS for public-domain tunnels, without trusting the relay

1
Comments
4 min read
The Quiet Security Crisis in Vibe-Coded Apps

The Quiet Security Crisis in Vibe-Coded Apps

Comments
3 min read
API Security in India: The Flaw Nobody Is Fixing

API Security in India: The Flaw Nobody Is Fixing

1
Comments 1
4 min read
Why 87% of Indian SMBs Have Zero Cybersecurity — And What We're Building to Fix It

Why 87% of Indian SMBs Have Zero Cybersecurity — And What We're Building to Fix It

Comments
3 min read
fail2ban vs CrowdSec vs Defensia: an honest comparison

fail2ban vs CrowdSec vs Defensia: an honest comparison

Comments
7 min read
Shadow AI Detection Tools Compared: Claw-Hunter vs openclaw-detect

Shadow AI Detection Tools Compared: Claw-Hunter vs openclaw-detect

Comments
4 min read
The Soul-Evil Attack: How Malicious Personas Hijack AI Agents (And How to Stop Them)

The Soul-Evil Attack: How Malicious Personas Hijack AI Agents (And How to Stop Them)

Comments
6 min read
Show HN: Isartor – Pure-Rust prompt firewall, deflects 60-95% of LLM traffic

Show HN: Isartor – Pure-Rust prompt firewall, deflects 60-95% of LLM traffic

Comments
1 min read
How to Find Every Consumer of Your Docker Base

How to Find Every Consumer of Your Docker Base

Comments
5 min read
Supply Chain Security: 4 Commands That Would Have Stopped the axios and litellm Attacks

Supply Chain Security: 4 Commands That Would Have Stopped the axios and litellm Attacks

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.