DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
SSH Hardening on Linux: A Practical Step-by-Step Guide

SSH Hardening on Linux: A Practical Step-by-Step Guide

1
Comments
3 min read
I Built 4 Apps in 3 Months Using AI — Here’s What Actually Happened

I Built 4 Apps in 3 Months Using AI — Here’s What Actually Happened

6
Comments 2
6 min read
Moltbook Exposed: It's Human Slop, Not AI Awakening

Moltbook Exposed: It's Human Slop, Not AI Awakening

8
Comments 5
4 min read
Security news weekly round-up - 16th January 2026

Security news weekly round-up - 16th January 2026

1
Comments
3 min read
How a Crypto-Miner Infiltrated My Umami Analytics (and How I Defeated It)

How a Crypto-Miner Infiltrated My Umami Analytics (and How I Defeated It)

Comments
3 min read
How to Find Your Real Origin IP Behind Cloudflare, Safely (and How to Fix Leaks)

How to Find Your Real Origin IP Behind Cloudflare, Safely (and How to Fix Leaks)

Comments
5 min read
Stop Leaking API Keys in your AI Agent Logs: A Go Sidecar Approach

Stop Leaking API Keys in your AI Agent Logs: A Go Sidecar Approach

1
Comments
6 min read
New update for CodeCoffeeTools! I include P2P Transfer Tool + more..

New update for CodeCoffeeTools! I include P2P Transfer Tool + more..

Comments
2 min read
The JWT Token Incident: Why Your Flutter App's Cache Isn't Secure (And How to Fix It)

The JWT Token Incident: Why Your Flutter App's Cache Isn't Secure (And How to Fix It)

Comments
11 min read
I Built a Self-Hosted Content Moderation API (Open Source)

I Built a Self-Hosted Content Moderation API (Open Source)

Comments
3 min read
Stop Pasting Secrets into AI Chat - Use AI-Safe Credentials Instead

Stop Pasting Secrets into AI Chat - Use AI-Safe Credentials Instead

Comments 2
2 min read
OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
HTTP/2 and Header Consistency: The Holy Grail of Stealth

HTTP/2 and Header Consistency: The Holy Grail of Stealth

Comments
6 min read
Converting an Unencrypted EBS Volume to an Encrypted One in AWS: A Step-by-Step Guide

Converting an Unencrypted EBS Volume to an Encrypted One in AWS: A Step-by-Step Guide

2
Comments
3 min read
The Best Practices for Secure API Integration in Financial Services

The Best Practices for Secure API Integration in Financial Services

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.