DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
IAM Security Audit

IAM Security Audit

3
Comments
8 min read
Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

Exploring Runtime Request Inspection in Laravel (Guards, Contexts, and Tradeoffs)

1
Comments
2 min read
Next.js Advanced FAQs: Fonts, Images, i18n, Security & Headless Shopify

Next.js Advanced FAQs: Fonts, Images, i18n, Security & Headless Shopify

1
Comments
4 min read
Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Comments
6 min read
Protecting Your Website with Cloudflare: Security, Performance, and Reliability [Part 2]

Protecting Your Website with Cloudflare: Security, Performance, and Reliability [Part 2]

Comments
8 min read
Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Residential vs Dedicated Proxies: What "Dedicated" Means and How to Decide

Comments
15 min read
I built a Docker vulnerability scanner - Beta testers wanted!!!

I built a Docker vulnerability scanner - Beta testers wanted!!!

Comments
1 min read
Shadow AI Is Everywhere: Meet Julius, the Open-Source LLM Fingerprinting Tool

Shadow AI Is Everywhere: Meet Julius, the Open-Source LLM Fingerprinting Tool

9
Comments 4
6 min read
Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Most Security Teams Can’t Scale Access Management Beyond 50 Employees - Here’s how to fix it

Comments
6 min read
Build a Military-Grade SOC for $0 (Wazuh + Docker + Python)

Build a Military-Grade SOC for $0 (Wazuh + Docker + Python)

Comments
2 min read
Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Zero-Knowledge Security: Protecting Patient Privacy Through Client-Side Encryption

Comments
3 min read
I Let Claude Write 80 Functions. 65-75% Had Security Vulnerabilities.

I Let Claude Write 80 Functions. 65-75% Had Security Vulnerabilities.

4
Comments 4
11 min read
The Incognito Mode Lie

The Incognito Mode Lie

103
Comments 11
3 min read
Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

Malicious Chrome Extensions Steal AI Chats: How to Protect Your Conversations in 2026

1
Comments
4 min read
Designing Secure Plugin Architectures for Desktop Applications

Designing Secure Plugin Architectures for Desktop Applications

Comments
12 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.