DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploit Analysis: PostgreSQL COPY FROM Filesystem Access

Exploit Analysis: PostgreSQL COPY FROM Filesystem Access

Comments
4 min read
Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials

Secure Serverless with HashiCorp Vault and Lambda: Dynamic Database Credentials

6
Comments 1
5 min read
Pixel-Powered Encryption: Turning an Image into a Key with Python

Pixel-Powered Encryption: Turning an Image into a Key with Python

1
Comments
2 min read
NFS, SMB, and File Sharing

NFS, SMB, and File Sharing

Comments
6 min read
Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)

Exploit Analysis: search_path Hijacking (The Hidden PostgreSQL Attack)

Comments
2 min read
Securing Middleware: The Express.js Static Analysis Standard

Securing Middleware: The Express.js Static Analysis Standard

Comments
3 min read
Applying CIS Hardening for Linux Servers Using Ansible Automation

Applying CIS Hardening for Linux Servers Using Ansible Automation

Comments
4 min read
CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

CVE-2025-55182: How React’s Biggest Vulnerability Happened — and What It Teaches Us About Modern Web Security

2
Comments
3 min read
VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

VPN Log Analyzer: Detect Brute Force, Session Hijacking & Credential Stuffing (100 Tests) 🔐

Comments
8 min read
Zero-Trust Auth: The JWT Static Analysis Standard

Zero-Trust Auth: The JWT Static Analysis Standard

Comments
3 min read
Frontend Protection: The Browser Static Analysis Standard

Frontend Protection: The Browser Static Analysis Standard

Comments
2 min read
Runtime Security at Scale: The Node.js Static Analysis Standard

Runtime Security at Scale: The Node.js Static Analysis Standard

Comments
2 min read
Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Hacking the Gridlock: AI's Fight Against Silent Traffic Attacks

Comments
2 min read
How to Add Audit Logs to Your App (The Complete Guide for Developers)

How to Add Audit Logs to Your App (The Complete Guide for Developers)

Comments
3 min read
Data Integrity & Anti-Cheating

Data Integrity & Anti-Cheating

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.