DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Inside the Hacker’s Playbook (Part 2): The Advanced Stuff Nobody Talks About

Comments
2 min read
Kubernetes Security Context: A Comprehensive Guide

Kubernetes Security Context: A Comprehensive Guide

2
Comments
5 min read
AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

AI Ransomware Army: How 80% of Cyberattacks Are Powered by Artificial Intelligence

1
Comments
2 min read
Enable DNSSEC Support in Your Node.js Application

Enable DNSSEC Support in Your Node.js Application

Comments
6 min read
PromptLock: When AI Meets Ransomware

PromptLock: When AI Meets Ransomware

Comments
2 min read
Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

7
Comments
2 min read
CloudFront ECDSA Signed URLs: 91% Faster Generation, 55% Shorter URLs

CloudFront ECDSA Signed URLs: 91% Faster Generation, 55% Shorter URLs

4
Comments 1
4 min read
Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Your Logs Contain Secrets: Why We Built a Zero-Knowledge Log Platform

Comments
7 min read
Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

Anatomy of a Supply Chain Heist: The Day 'chalk' and 'debug' Became Crypto-Thieves

7
Comments 2
17 min read
Warpgate: The Smart Bastion Host That Will Change Your Workflow

Warpgate: The Smart Bastion Host That Will Change Your Workflow

Comments
3 min read
Networking Series 9: VPC Endpoints

Networking Series 9: VPC Endpoints

Comments
5 min read
Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Exploring Process Injection, Hollowing, and Shellcode Execution in Windows

Comments
3 min read
The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

The NPM Supply Chain Attack: What Happened, Why It Matters, and How to Stay Safe

11
Comments 2
5 min read
How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

How One Phishing Email Just Compromised 2.6 Billion NPM Downloads (And Why Every Dev Should Care)

27
Comments
4 min read
Eyes Wide Shut

Eyes Wide Shut

Comments
16 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.