DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Solve Headache Backend API Authentication with Proven NPM Packages

Solve Headache Backend API Authentication with Proven NPM Packages

Comments
2 min read
CVE-2023-43633: Trusted Boot, Untrusted Config: Breaking EVE OS Encryption (CVE-2023-43633)

CVE-2023-43633: Trusted Boot, Untrusted Config: Breaking EVE OS Encryption (CVE-2023-43633)

Comments
2 min read
Solana Lending Protocol Security: A Deep Dive into Audit Best Practices

Solana Lending Protocol Security: A Deep Dive into Audit Best Practices

1
Comments
8 min read
How I Found $300,000 Worth of Secrets in a Download Button

How I Found $300,000 Worth of Secrets in a Download Button

Comments
5 min read
🔐Current Passkeys Are a Single Point of Failure

🔐Current Passkeys Are a Single Point of Failure

Comments
3 min read
Studying the Great Firewall's obfuscation and detection techniques (GFW)

Studying the Great Firewall's obfuscation and detection techniques (GFW)

Comments
4 min read
HackTheBox Sherlock Brutus Writeup

HackTheBox Sherlock Brutus Writeup

Comments
17 min read
The Hidden Attack Surface of AI Agents: Why Agent Security is the Next Big Thing

The Hidden Attack Surface of AI Agents: Why Agent Security is the Next Big Thing

Comments
4 min read
Building a Living Firewall: A Vaccine Model for Cybersecurity

Building a Living Firewall: A Vaccine Model for Cybersecurity

Comments
2 min read
Running DNS Is Easy. Trusting It Is Not.

Running DNS Is Easy. Trusting It Is Not.

Comments
4 min read
The Day My Linux Server Started Distributing Windows Malware

The Day My Linux Server Started Distributing Windows Malware

Comments
4 min read
The Developer's Guide to 'Safe Share'

The Developer's Guide to 'Safe Share'

4
Comments
1 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers

Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers

Comments
5 min read
From Leaky Container to Fort Knox: A Guide to Docker Security Hardening

From Leaky Container to Fort Knox: A Guide to Docker Security Hardening

1
Comments
2 min read
SSTI Explained: HTB Hacknet Writeup

SSTI Explained: HTB Hacknet Writeup

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.