DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

2
Comments 1
6 min read
Engineering Trust in 2025: A Developer’s Field Guide to Credible Information

Engineering Trust in 2025: A Developer’s Field Guide to Credible Information

Comments
5 min read
PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord
Cover image for PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

Comments
3 min read
Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis
Cover image for Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis

Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis

1
Comments
4 min read
Day 2 — Phishing & Identity Verification (The Typed Letter)
Cover image for Day 2 — Phishing & Identity Verification (The Typed Letter)

Day 2 — Phishing & Identity Verification (The Typed Letter)

6
Comments
2 min read
Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment
Cover image for Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment

Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment

3
Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
Dirty COW exploit that broke linux in 2016
Cover image for Dirty COW exploit that broke linux in 2016

Dirty COW exploit that broke linux in 2016

Comments
2 min read
🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity
Cover image for 🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

Comments
4 min read
Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance
Cover image for Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

Keycloak, WebSockets & Symfony: Solving Real-Time Auth Without Sacrificing Performance

1
Comments
16 min read
MVP Conf 2025 - OWASP API Security Top 10

MVP Conf 2025 - OWASP API Security Top 10

Comments
3 min read
I Was Given a “Job Assignment” That Installed Malware
Cover image for I Was Given a “Job Assignment” That Installed Malware

I Was Given a “Job Assignment” That Installed Malware

3
Comments
2 min read
WHAT IS A SECRET?

WHAT IS A SECRET?

6
Comments
6 min read
JWT Token Validator Challenge
Cover image for JWT Token Validator Challenge

JWT Token Validator Challenge

2
Comments
8 min read
Security-First WebSockets: Protecting Real-Time Communications
Cover image for Security-First WebSockets: Protecting Real-Time Communications

Security-First WebSockets: Protecting Real-Time Communications

3
Comments 2
2 min read
eBPF Tutorial: Privilege Escalation via File Content Manipulation

eBPF Tutorial: Privilege Escalation via File Content Manipulation

Comments
7 min read
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats
Cover image for How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

Comments
5 min read
Create Microsoft OAuth2 API

Create Microsoft OAuth2 API

Comments
1 min read
ABAC with Open Policy Agent (OPA)

ABAC with Open Policy Agent (OPA)

Comments
9 min read
How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)
Cover image for How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

1
Comments
4 min read
Understanding SSH: A Beginner's Guide
Cover image for Understanding SSH: A Beginner's Guide

Understanding SSH: A Beginner's Guide

3
Comments
8 min read
Trust-First Growth for Crypto Tech: A Developer’s Playbook

Trust-First Growth for Crypto Tech: A Developer’s Playbook

Comments
5 min read
Let's Stop Overprotecting Confidential Information

Let's Stop Overprotecting Confidential Information

Comments
3 min read
Data Protection in Blockchain | CCPA Compliance
Cover image for Data Protection in Blockchain | CCPA Compliance

Data Protection in Blockchain | CCPA Compliance

3
Comments
3 min read
The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security
Cover image for The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

Comments
9 min read
loading...