DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)
Cover image for The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

Comments
8 min read
Federated avatars in authentik

Federated avatars in authentik

Comments 2
4 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

16
Comments 2
4 min read
Secure DevSecOps Pipelines

Secure DevSecOps Pipelines

Comments
5 min read
Security Alert: How to Check for the "Shai-Hulud" Compromise
Cover image for Security Alert: How to Check for the "Shai-Hulud" Compromise

Security Alert: How to Check for the "Shai-Hulud" Compromise

1
Comments
2 min read
One Line of Code to Secure Your AI Agents *(and Your Shadow MCP Servers)

One Line of Code to Secure Your AI Agents *(and Your Shadow MCP Servers)

Comments
6 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

3
Comments
4 min read
Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Comments
1 min read
6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms
Cover image for 6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

Comments
8 min read
Ransomware 2025: What’s New and How to Stay Protected

Ransomware 2025: What’s New and How to Stay Protected

5
Comments
5 min read
Verified Computing vs. Black Box AI

Verified Computing vs. Black Box AI

3
Comments 4
3 min read
How to Install DVWS (Damn Vulnerable Web Services) on Nginx

How to Install DVWS (Damn Vulnerable Web Services) on Nginx

1
Comments
5 min read
Directory Traversal Attacks

Directory Traversal Attacks

Comments
5 min read
Security news weekly round-up - 5th December 2025
Cover image for Security news weekly round-up - 5th December 2025

Security news weekly round-up - 5th December 2025

2
Comments
3 min read
Building a "Fortress" Kubernetes Cluster: Talos Linux, Proxmox, and Network Isolation

Building a "Fortress" Kubernetes Cluster: Talos Linux, Proxmox, and Network Isolation

4
Comments 1
4 min read
The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)
Cover image for The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

Comments
2 min read
I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)
Cover image for I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)

I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)

1
Comments
7 min read
Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It
Cover image for Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Comments
3 min read
Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles
Cover image for Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles

Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles

Comments
2 min read
Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic
Cover image for Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic

Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic

Comments 1
130 min read
🗂️ Wallet-as-a-Service: Why Building Your Own Wallet Is So 2025
Cover image for 🗂️ Wallet-as-a-Service: Why Building Your Own Wallet Is So 2025

🗂️ Wallet-as-a-Service: Why Building Your Own Wallet Is So 2025

2
Comments
2 min read
The Dark Art Of Behavioral Enumeration And Why It Works Every Time
Cover image for The Dark Art Of Behavioral Enumeration And Why It Works Every Time

The Dark Art Of Behavioral Enumeration And Why It Works Every Time

5
Comments
7 min read
OAuth 2.0 Deep Dive — From Textbook Diagrams to Production-Ready Authorization

OAuth 2.0 Deep Dive — From Textbook Diagrams to Production-Ready Authorization

5
Comments
10 min read
Role Based Access Control in SeaORM 2.0
Cover image for Role Based Access Control in SeaORM 2.0

Role Based Access Control in SeaORM 2.0

1
Comments
9 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
loading...