DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Lock N' Key : The Developer's Vault

Lock N' Key : The Developer's Vault

Comments
2 min read
AES vs ChaCha20: Explained While Building Real Crypto Tools

AES vs ChaCha20: Explained While Building Real Crypto Tools

Comments
2 min read
PHP file upload example!

PHP file upload example!

Comments
2 min read
Ditching the Access Key: Implementing IAM Roles Anywhere for Secure Edge and On-Prem Workloads

Ditching the Access Key: Implementing IAM Roles Anywhere for Secure Edge and On-Prem Workloads

Comments
3 min read
Building a Hardware TOTP Authenticator on ESP32: The Memory Management Nightmare

Building a Hardware TOTP Authenticator on ESP32: The Memory Management Nightmare

Comments
3 min read
Purple Teaming, Or: Why Siloed Teams Fail

Purple Teaming, Or: Why Siloed Teams Fail

1
Comments
5 min read
EIP-7934: The RLP Block Size Limit That Makes Ethereum Safer and More Predictable

EIP-7934: The RLP Block Size Limit That Makes Ethereum Safer and More Predictable

1
Comments
4 min read
CVE-2026-0863: Snake in the Sandbox: Breaking n8n with Python 3.10 Internals

CVE-2026-0863: Snake in the Sandbox: Breaking n8n with Python 3.10 Internals

Comments
2 min read
CVE-2026-24420: CVE-2026-24420: When `isset()` Becomes a Backdoor in phpMyFAQ

CVE-2026-24420: CVE-2026-24420: When `isset()` Becomes a Backdoor in phpMyFAQ

Comments
2 min read
Block Outbound Traffic for a Specific Linux User with iptables (While Keeping Listening Ports Working)

Block Outbound Traffic for a Specific Linux User with iptables (While Keeping Listening Ports Working)

Comments
3 min read
AWS OIDC Setup for CircleCI

AWS OIDC Setup for CircleCI

Comments
4 min read
Configuring a VPS From Scratch (Debian)

Configuring a VPS From Scratch (Debian)

Comments
3 min read
eJPT Lab Walkthrough: Vulnerability Assessment

eJPT Lab Walkthrough: Vulnerability Assessment

Comments
3 min read
Building a “Software HSM” Workflow with SoftHSM2, OpenSC, and Python (Private Key Never Exported)

Building a “Software HSM” Workflow with SoftHSM2, OpenSC, and Python (Private Key Never Exported)

Comments
5 min read
5 Email Attack Vectors Every SaaS Should Block

5 Email Attack Vectors Every SaaS Should Block

2
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.