DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
1% 0 — Sobre la improbabilidad estadística de conservar la conciencia en un sistema que la penaliza

1% 0 — Sobre la improbabilidad estadística de conservar la conciencia en un sistema que la penaliza

Comments
4 min read
Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

2
Comments 1
7 min read
Media types (MIME types) in HTTP explained

Media types (MIME types) in HTTP explained

8
Comments
2 min read
Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Comments
3 min read
Security news weekly round-up - 31st October 2025

Security news weekly round-up - 31st October 2025

Comments
2 min read
Secure Your Supabase Auth with email_guard

Secure Your Supabase Auth with email_guard

Comments
8 min read
Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Top 10 Modern Cryptography Practices for Secure P2P Chat (2025–2026)

Comments
3 min read
MCP Security: Navigating the Exploit Playbook for Agent

MCP Security: Navigating the Exploit Playbook for Agent

15
Comments 4
7 min read
How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)

How Google Mistook My Sui Node for a Bitcoin Farm (And Banned Me) (again)

Comments
3 min read
Disable antivirus real-time monitoring with PowerShell

Disable antivirus real-time monitoring with PowerShell

Comments
1 min read
Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan

Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan

Comments
2 min read
Creating a Maintenance Page using a Cloudflare Worker

Creating a Maintenance Page using a Cloudflare Worker

1
Comments
4 min read
From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

Comments
1 min read
Why is authN and AuthZ still the hardest part of building solo?

Why is authN and AuthZ still the hardest part of building solo?

Comments
1 min read
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Understanding Hashing: The Backbone of Data Integrity in Cybersecurity

Comments
4 min read
🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

Comments
3 min read
Penetration Testing vs. Red Teaming

Penetration Testing vs. Red Teaming

Comments
4 min read
🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

Comments
3 min read
Evading AV and EDR solutions

Evading AV and EDR solutions

2
Comments
5 min read
Eppie, a new open-source cross-platform email client, on Snap Store🐧

Eppie, a new open-source cross-platform email client, on Snap Store🐧

2
Comments
2 min read
Why the Model Context Protocol is the Future of AI Integration

Why the Model Context Protocol is the Future of AI Integration

Comments
8 min read
How to use authentication using Athentication Kit

How to use authentication using Athentication Kit

Comments
3 min read
 🦀 Rust Weekly Log — This Week’s Progress

 🦀 Rust Weekly Log — This Week’s Progress

Comments
1 min read
Staged vs. Non Staged Payloads

Staged vs. Non Staged Payloads

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
loading...