DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I scanned 37 sites from Hacker News for leaked secrets. One had 6.

I scanned 37 sites from Hacker News for leaked secrets. One had 6.

Comments
2 min read
'Chainguard' image for secure service

'Chainguard' image for secure service

Comments
5 min read
Why Sovereignty fails when it isn’t measurable and what AWS tries to fix with ESC-SRF

Why Sovereignty fails when it isn’t measurable and what AWS tries to fix with ESC-SRF

4
Comments 2
12 min read
Building a FinTech Approval System with Symfony 7.4

Building a FinTech Approval System with Symfony 7.4

Comments
8 min read
DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

99
Comments 25
11 min read
n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

Comments
5 min read
Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Comments
3 min read
Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Comments
1 min read
[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

Comments
2 min read
Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Comments
9 min read
I Evaluated Enterprise Auth for a SaaS App and Here’s My Honest Take on WorkOS AuthKit + Radar

I Evaluated Enterprise Auth for a SaaS App and Here’s My Honest Take on WorkOS AuthKit + Radar

13
Comments
6 min read
Day 12 — React2Shell CVE (The Mines)

Day 12 — React2Shell CVE (The Mines)

Comments
2 min read
How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

Comments
3 min read
Fortifying Your Data: Row-Level Security in Power BI.

Fortifying Your Data: Row-Level Security in Power BI.

Comments
4 min read
Rust Weekly Log: Crypto Foundations & Clean Architecture

Rust Weekly Log: Crypto Foundations & Clean Architecture

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.