DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
React2Shell (CVE‑2025‑55182): la vulnerabilidad que sacudió Next.js y cómo sobrevivir a la migración
Cover image for React2Shell (CVE‑2025‑55182): la vulnerabilidad que sacudió Next.js y cómo sobrevivir a la migración

React2Shell (CVE‑2025‑55182): la vulnerabilidad que sacudió Next.js y cómo sobrevivir a la migración

Comments
2 min read
Outil de Cybersécurité du Jour - Nov 6, 2025

Outil de Cybersécurité du Jour - Nov 6, 2025

Comments
2 min read
6 Strategic AI Methods for Senior Developers in 2026
Cover image for 6 Strategic AI Methods for Senior Developers in 2026

6 Strategic AI Methods for Senior Developers in 2026

Comments 1
7 min read
Vibecoding and the future of code security
Cover image for Vibecoding and the future of code security

Vibecoding and the future of code security

3
Comments
4 min read
Building a Password Checker with Vanilla JS (No Frameworks!)
Cover image for Building a Password Checker with Vanilla JS (No Frameworks!)

Building a Password Checker with Vanilla JS (No Frameworks!)

Comments
5 min read
I built NextgenCode.dev — AI-powered website scanner for developers and startups
Cover image for I built NextgenCode.dev — AI-powered website scanner for developers and startups

I built NextgenCode.dev — AI-powered website scanner for developers and startups

Comments
1 min read
Grupos de Segurança e Portas Padrão: Entendendo os Firewalls da AWS

Grupos de Segurança e Portas Padrão: Entendendo os Firewalls da AWS

Comments
4 min read
Understanding SIEM: Security Information and Event Management
Cover image for Understanding SIEM: Security Information and Event Management

Understanding SIEM: Security Information and Event Management

1
Comments
10 min read
React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)
Cover image for React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

React2Shell: Understanding the Critical RCE Vulnerability in React Server Components (CVE-2025-55182)

2
Comments
9 min read
I Fixed AI Coding Assistants with Real-Time npm & CVE Data (DevTrends MCP)

I Fixed AI Coding Assistants with Real-Time npm & CVE Data (DevTrends MCP)

Comments
2 min read
React2Shell: The Critical RCE Vulnerability Every Next.js Developer Must Address Now
Cover image for React2Shell: The Critical RCE Vulnerability Every Next.js Developer Must Address Now

React2Shell: The Critical RCE Vulnerability Every Next.js Developer Must Address Now

1
Comments
7 min read
How Stargate Data Center Is Redefining High-Security Data Infrastructure?
Cover image for How Stargate Data Center Is Redefining High-Security Data Infrastructure?

How Stargate Data Center Is Redefining High-Security Data Infrastructure?

Comments
7 min read
🧩 JSFuck — JavaScript Using Only 6 Characters
Cover image for 🧩 JSFuck — JavaScript Using Only 6 Characters

🧩 JSFuck — JavaScript Using Only 6 Characters

Comments
2 min read
Upwork verification call. What questions to expect?

Upwork verification call. What questions to expect?

Comments
2 min read
OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

Comments
25 min read
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
Cover image for Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Comments
14 min read
File Chunking: Why It Matters for Cybersecurity in Modern Applications

File Chunking: Why It Matters for Cybersecurity in Modern Applications

Comments
2 min read
Top IDEs and Editors Used 👨🏻‍💻📝💡
Cover image for Top IDEs and Editors Used 👨🏻‍💻📝💡

Top IDEs and Editors Used 👨🏻‍💻📝💡

5
Comments
1 min read
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
Cover image for From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

Comments
12 min read
Automate Dynamic Application Security Testing (DAST) with CI/CD
Cover image for Automate Dynamic Application Security Testing (DAST) with CI/CD

Automate Dynamic Application Security Testing (DAST) with CI/CD

Comments
2 min read
Building a Strike System: How I Prevent AI Feature Abuse in My News App
Cover image for Building a Strike System: How I Prevent AI Feature Abuse in My News App

Building a Strike System: How I Prevent AI Feature Abuse in My News App

Comments
4 min read
Keeping Your Health Data Out of Court
Cover image for Keeping Your Health Data Out of Court

Keeping Your Health Data Out of Court

Comments
4 min read
Agentic AI Security: Why Autonomous Systems Require a New Security Framework
Cover image for Agentic AI Security: Why Autonomous Systems Require a New Security Framework

Agentic AI Security: Why Autonomous Systems Require a New Security Framework

38
Comments 12
5 min read
File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes
Cover image for File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

Comments
7 min read
Kubernetes validating admission policy and admission binding
Cover image for Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
loading...