DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks

Comments
9 min read
Mulesoft with AI

Mulesoft with AI

Comments
3 min read
This Week in AI Security: OpenAI Codex Hacked, LiteLLM Supply Chain Attack, Claude Gets Computer Control

This Week in AI Security: OpenAI Codex Hacked, LiteLLM Supply Chain Attack, Claude Gets Computer Control

Comments
3 min read
What's your email setup for privacy in 2026?

What's your email setup for privacy in 2026?

Comments 1
1 min read
Claude Mythos: What We Actually Know (and What We Don't)

Claude Mythos: What We Actually Know (and What We Don't)

Comments
8 min read
Your package was compromised. How do you prove which version you actually shipped?

Your package was compromised. How do you prove which version you actually shipped?

Comments
3 min read
The LiteLLM Supply Chain Attack: Why Vibe Coders Are the Most Exposed

The LiteLLM Supply Chain Attack: Why Vibe Coders Are the Most Exposed

Comments
3 min read
كيفية عمل هجوم سلسلة التوريد Axios NPM (وكيفية حماية مشاريع API الخاصة بك)

كيفية عمل هجوم سلسلة التوريد Axios NPM (وكيفية حماية مشاريع API الخاصة بك)

Comments
3 min read
TryHackMe — Brainstorm Write-up | Buffer Overflow on Windows

TryHackMe — Brainstorm Write-up | Buffer Overflow on Windows

2
Comments
3 min read
CTF Writeup: PowerAnalysis: Warmup

CTF Writeup: PowerAnalysis: Warmup

Comments
3 min read
How to Handle Sensitive Data Securely in Terraform

How to Handle Sensitive Data Securely in Terraform

1
Comments
5 min read
MCP Security Is the New Cloud Security

MCP Security Is the New Cloud Security

Comments
4 min read
Securing the Agentic Era: An Architectural Review of NVIDIA OpenShell vs. Node9 Proxy

Securing the Agentic Era: An Architectural Review of NVIDIA OpenShell vs. Node9 Proxy

Comments
5 min read
YubiKey SSH Authentication: Stop Trusting Key Files on Disk

YubiKey SSH Authentication: Stop Trusting Key Files on Disk

Comments
5 min read
I mapped all 84 MITRE ATLAS techniques to AI agent detection rules — here's what I found

I mapped all 84 MITRE ATLAS techniques to AI agent detection rules — here's what I found

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.