DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Leveraging Robust Secrets Management for Secure Data Handling in Modern Applications

Leveraging Robust Secrets Management for Secure Data Handling in Modern Applications

5
Comments 2
3 min read
From Software to Sustainability: Can Tech Save the Planet?

From Software to Sustainability: Can Tech Save the Planet?

Comments
5 min read
The Future of AI Isn’t Coming ,It’s Already in Your Inbox

The Future of AI Isn’t Coming ,It’s Already in Your Inbox

Comments
5 min read
Debugging SAML Response XML: A Step-by-Step Guide

Debugging SAML Response XML: A Step-by-Step Guide

Comments 1
2 min read
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments 1
3 min read
The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

Comments
5 min read
Russian hackers deploy zero-day attack on government email systems

Russian hackers deploy zero-day attack on government email systems

Comments 1
3 min read
Secure MCP Server with NGINX + Supergateway + Render

Secure MCP Server with NGINX + Supergateway + Render

Comments 1
4 min read
Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Comments
4 min read
Introduction to IAM in Oracle Cloud Infrastructure

Introduction to IAM in Oracle Cloud Infrastructure

6
Comments 2
3 min read
How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
What’s Happening Inside Your Linux Kernel?

What’s Happening Inside Your Linux Kernel?

6
Comments
4 min read
Day 11 : FastAPI Auth: Login with JWT & Route Protection

Day 11 : FastAPI Auth: Login with JWT & Route Protection

2
Comments
6 min read
Secure CI/CD 2025: How I Harden GitLab at Scale

Secure CI/CD 2025: How I Harden GitLab at Scale

Comments
1 min read
Specter-AAL

Specter-AAL

5
Comments
2 min read
Real-Time API Token Leak Detection & Response with Python

Real-Time API Token Leak Detection & Response with Python

Comments
1 min read
Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Comments
3 min read
Try the new Secure Session Vault

Try the new Secure Session Vault

Comments
2 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
WordPress Roles & Capabilities: A Practical Guide

WordPress Roles & Capabilities: A Practical Guide

Comments
1 min read
AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

1
Comments 1
2 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
Getting my Laravel application security audited

Getting my Laravel application security audited

Comments
5 min read
loading...