DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Quality Assurance Engineers Can Strengthen Application Security

How Quality Assurance Engineers Can Strengthen Application Security

Comments
2 min read
Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Comments
9 min read
Stealth Inline Hook Detection via LR Return Address

Stealth Inline Hook Detection via LR Return Address

Comments
2 min read
How 129KB of Whitespace (and a Recursive Loop) Broke the Web

How 129KB of Whitespace (and a Recursive Loop) Broke the Web

Comments
5 min read
Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Comments
4 min read
ASP.NET CORE - How to using IAuthorizationRequirementData

ASP.NET CORE - How to using IAuthorizationRequirementData

Comments
2 min read
📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

Comments
3 min read
Building a FinTech Approval System with Symfony 7.4

Building a FinTech Approval System with Symfony 7.4

Comments
8 min read
Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Comments
3 min read
Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Comments
1 min read
[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

Comments
2 min read
Day 12 — React2Shell CVE (The Mines)

Day 12 — React2Shell CVE (The Mines)

Comments
2 min read
Quality Assurance Strategy untuk Modul Reply

Quality Assurance Strategy untuk Modul Reply

Comments
8 min read
How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

Comments
3 min read
Fortifying Your Data: Row-Level Security in Power BI.

Fortifying Your Data: Row-Level Security in Power BI.

Comments
4 min read
Security news weekly round-up - 12th December 2025

Security news weekly round-up - 12th December 2025

1
Comments
3 min read
Rust Weekly Log: Crypto Foundations & Clean Architecture

Rust Weekly Log: Crypto Foundations & Clean Architecture

Comments
1 min read
Why Your UEBA Isn’t Working (and how to fix it)

Why Your UEBA Isn’t Working (and how to fix it)

1
Comments
7 min read
LLM Prompt Engineering: A Practical Guide to Not Getting Hacked

LLM Prompt Engineering: A Practical Guide to Not Getting Hacked

Comments
7 min read
How I Detected and Stopped a Real-World RCE Attack on My Next.js App (CVE-2025-55182 / React2Shell)

How I Detected and Stopped a Real-World RCE Attack on My Next.js App (CVE-2025-55182 / React2Shell)

Comments
4 min read
OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

Comments
51 min read
Experimental Hono auth npm package

Experimental Hono auth npm package

Comments
2 min read
Day 13 — Audit and Update Old Infrastructure (Deep in the Mines)

Day 13 — Audit and Update Old Infrastructure (Deep in the Mines)

Comments
2 min read
Unlocking Web Security: Mastering Authentication in the Digital Age

Unlocking Web Security: Mastering Authentication in the Digital Age

Comments
2 min read
🚨 Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

🚨 Supply Chain Attack Simulation on Drupal: RCE via Malicious Update Server (PoC, not a CVE)

Comments
1 min read
loading...