DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Your VPN Gets Blocked and How Domain Fronting Solves It

Why Your VPN Gets Blocked and How Domain Fronting Solves It

1
Comments
5 min read
HAProxy HTTP/3 Desync, Prompt Injection Dataset, & Entra ID Hardening

HAProxy HTTP/3 Desync, Prompt Injection Dataset, & Entra ID Hardening

Comments
3 min read
Gas Bomb in Starknet: How One Unbounded Loop Can Brick Your Staking Protocol

Gas Bomb in Starknet: How One Unbounded Loop Can Brick Your Staking Protocol

Comments
2 min read
Why Consumers Keep Falling for Online Scams and How Technology Can Help.

Why Consumers Keep Falling for Online Scams and How Technology Can Help.

Comments
8 min read
Your Browser Extensions Are a Security Hole — Here's How to Audit Them

Your Browser Extensions Are a Security Hole — Here's How to Audit Them

1
Comments
5 min read
Cybersecurity Looks Like Proof of Work Now — And That Should Scare You

Cybersecurity Looks Like Proof of Work Now — And That Should Scare You

Comments
7 min read
Securing AI Agents: A Practical Guide for IT Leaders

Securing AI Agents: A Practical Guide for IT Leaders

Comments
7 min read
We Built a Free Website Health Scanner. Here's What It Finds on Most Sites

We Built a Free Website Health Scanner. Here's What It Finds on Most Sites

Comments
5 min read
Zero Trust Architecture: Why Good Intentions Are Not Enough

Zero Trust Architecture: Why Good Intentions Are Not Enough

Comments
15 min read
How to Evaluate AI Security Vendors Without Getting Fooled

How to Evaluate AI Security Vendors Without Getting Fooled

Comments
3 min read
What Is AI Red-Teaming? A Practical Introduction for Security Professionals

What Is AI Red-Teaming? A Practical Introduction for Security Professionals

Comments
3 min read
Bridging the Gap: Converting SPDX 3.0 to 2.3 in the Software Supply Chain

Bridging the Gap: Converting SPDX 3.0 to 2.3 in the Software Supply Chain

Comments
3 min read
Credential Vending in Apache Polaris: Securing Data Access Without Sharing Keys

Credential Vending in Apache Polaris: Securing Data Access Without Sharing Keys

Comments
4 min read
GHSA-JJ6C-8H6C-HPPX: GHSA-JJ6C-8H6C-HPPX: Uncontrolled Resource Consumption in pypdf via Malformed PDF Streams

GHSA-JJ6C-8H6C-HPPX: GHSA-JJ6C-8H6C-HPPX: Uncontrolled Resource Consumption in pypdf via Malformed PDF Streams

Comments
2 min read
Privacy-First Security: Classifying Encrypted Tunnel Traffic Without Breaking the Seal

Privacy-First Security: Classifying Encrypted Tunnel Traffic Without Breaking the Seal

1
Comments
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.