DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)

Day 15 — How to Respond to an Ongoing Compromise (Hawk's Path)

Comments
2 min read
Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Why I Built an Offline Pre-Audit Platform for Supply Chain Security (Before Scanning or Pentesting)

Comments
1 min read
I Lost $2,300 in One Night Because of Expired SSL CertificatesOr: How I learned to stop worrying and automate SSL monitoring

I Lost $2,300 in One Night Because of Expired SSL CertificatesOr: How I learned to stop worrying and automate SSL monitoring

1
Comments
5 min read
How to Hack an LLM (And Why It's Easier Than You Think)

How to Hack an LLM (And Why It's Easier Than You Think)

2
Comments
6 min read
Memory-Safe Secrets in .NET Configuration

Memory-Safe Secrets in .NET Configuration

1
Comments
9 min read
Securing Gmail AI Agents against Prompt Injection with Model Armor

Securing Gmail AI Agents against Prompt Injection with Model Armor

1
Comments
7 min read
Shipping a Landing Page Without Regrets: Security, Privacy, and Reliability for Real Humans

Shipping a Landing Page Without Regrets: Security, Privacy, and Reliability for Real Humans

Comments
6 min read
Create GitLab Access Token

Create GitLab Access Token

Comments
1 min read
Building a Simple, Secure File Upload System with AWS Lambda and S3

Building a Simple, Secure File Upload System with AWS Lambda and S3

Comments
2 min read
Prompt Injection Mitigation in AI Systems Using API Gateway

Prompt Injection Mitigation in AI Systems Using API Gateway

1
Comments
10 min read
Security Architecture Decisions in My Cloud Resume Challenge

Security Architecture Decisions in My Cloud Resume Challenge

1
Comments
4 min read
Payment Gateway Testing: Use Cases, Test Cases, 2025-Fit Solutions

Payment Gateway Testing: Use Cases, Test Cases, 2025-Fit Solutions

Comments
18 min read
How Shadow IT Turns Employees Into Unintentional Insider Threats

How Shadow IT Turns Employees Into Unintentional Insider Threats

Comments
5 min read
How we built Afina and why WebRTC + QUIC actually matter

How we built Afina and why WebRTC + QUIC actually matter

4
Comments 3
2 min read
Building a Privacy-Preserving Voting App

Building a Privacy-Preserving Voting App

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.