DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1

13
Comments
2 min read
Stopping Bad Actors: Inside 1Password’s Security Model

Stopping Bad Actors: Inside 1Password’s Security Model

Comments
6 min read
Prompt Injection 2.0: The New Frontier of AI Attacks

Prompt Injection 2.0: The New Frontier of AI Attacks

1
Comments
7 min read
🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫

🔒 Vulnerability Remediation (Cybersecurity Patch) 🛠️ by Avoiding Broken Access Control 🚫

Comments
2 min read
How We Built Complete Formal Verification for Chronos Vault

How We Built Complete Formal Verification for Chronos Vault

Comments
4 min read
Securing Frontend Apps from Lodash Issues

Securing Frontend Apps from Lodash Issues

Comments
3 min read
Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Fortalecendo a Integridade de Aplicações Android: Uma abordagem multicamadas sobre Detecção de Root, Dev Mode e Emuladores.

Comments
6 min read
Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Comments
2 min read
Why Default Passwords Are Still a Massive Problem in 2025

Why Default Passwords Are Still a Massive Problem in 2025

Comments
5 min read
Building a Multi-Chain Security Vault with Mathematical Guarantees

Building a Multi-Chain Security Vault with Mathematical Guarantees

1
Comments
5 min read
Gadget chains in Java: how unsafe deserialization leads to RCE?

Gadget chains in Java: how unsafe deserialization leads to RCE?

Comments
11 min read
Security news weekly round-up - 10th October 2025

Security news weekly round-up - 10th October 2025

1
Comments
5 min read
AWS Control Tower: Create Your First Landing Zone

AWS Control Tower: Create Your First Landing Zone

Comments
4 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
Block S3 Website with Terraform (Keep IP Access Ready)

Block S3 Website with Terraform (Keep IP Access Ready)

Comments
3 min read
How to install tailscale on your Unifi router (UDM)

How to install tailscale on your Unifi router (UDM)

Comments
2 min read
WPA2 Lab Walkthrough — Capture, Analyze, and Harden (Simulated Only)

WPA2 Lab Walkthrough — Capture, Analyze, and Harden (Simulated Only)

Comments
1 min read
How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

How I safely tested a TurnKey CCTV appliance (lab workflow + mitigation playbook)

Comments
2 min read
Securing LangChain APIs with AWS SSO and Active Directory

Securing LangChain APIs with AWS SSO and Active Directory

Comments
4 min read
Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Day 3 – Understanding HTTP & HTTPS: The Backbone of the Web

Comments
3 min read
Stop Using SSH Keys in GitHub Actions (Here's What to Use Instead)

Stop Using SSH Keys in GitHub Actions (Here's What to Use Instead)

7
Comments
6 min read
Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
Hardware ID Spoofer: What is an HWID Spoofer?

Hardware ID Spoofer: What is an HWID Spoofer?

Comments
6 min read
Networking Protocols & Technologies

Networking Protocols & Technologies

Comments
11 min read
Using jszip library to decompress zip with password reports an error

Using jszip library to decompress zip with password reports an error

Comments
3 min read
loading...