DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Yet Another Password Authentication Flow.. but hear me out

Yet Another Password Authentication Flow.. but hear me out

Comments
8 min read
Auth Series: Yet Another Password Authentication Flow.. but hear me out

Auth Series: Yet Another Password Authentication Flow.. but hear me out

Comments
8 min read
Role-Based Authorization for Rails: How We Built Rabarber

Role-Based Authorization for Rails: How We Built Rabarber

Comments
4 min read
Let's Stick to GmailApp Over MailApp in Google Apps Script

Let's Stick to GmailApp Over MailApp in Google Apps Script

Comments
6 min read
From Frustration to Protection: The Logic of Secure Coding

From Frustration to Protection: The Logic of Secure Coding

Comments
2 min read
30+ WordPress Security Best Practices in 2025

30+ WordPress Security Best Practices in 2025

1
Comments
17 min read
PyKryptor - open source AxCrypt alternative

PyKryptor - open source AxCrypt alternative

Comments
2 min read
The Security Logic Behind LLM Jailbreaking

The Security Logic Behind LLM Jailbreaking

1
Comments
6 min read
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]

Comments
4 min read
🐧 Hardening Linux: практическое руководство для безопасной работы

🐧 Hardening Linux: практическое руководство для безопасной работы

1
Comments
2 min read
Beware the Forgotten Tab: Understanding and Preventing Tabsnabbing

Beware the Forgotten Tab: Understanding and Preventing Tabsnabbing

Comments
3 min read
Fine-Tune Access, Visibility, and Security

Fine-Tune Access, Visibility, and Security

Comments
3 min read
OWASP Top 10 e segurança web

OWASP Top 10 e segurança web

Comments
4 min read
Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Azure Data Encryption Best Practices: How to Secure Data at Rest, In Transit & In Use

Comments
4 min read
How to Write Secure Firebase Rules

How to Write Secure Firebase Rules

Comments
7 min read
Lesson 21: Freqtrade-Exchange API Configuration

Lesson 21: Freqtrade-Exchange API Configuration

Comments
9 min read
Arcjet: Developer-First Security for Modern Apps

Arcjet: Developer-First Security for Modern Apps

Comments
3 min read
Step-by-Step Guide: Scanning Your .NET Project with SonarQube

Step-by-Step Guide: Scanning Your .NET Project with SonarQube

Comments
2 min read
90-Day Proven Post-Quantum TLS Readiness Sprint

90-Day Proven Post-Quantum TLS Readiness Sprint

2
Comments
7 min read
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity

1
Comments
8 min read
My Freelance Journey and a Safe Dive into XSS (Cross-Site Scripting) 🌐💻

My Freelance Journey and a Safe Dive into XSS (Cross-Site Scripting) 🌐💻

Comments
2 min read
Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats

Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats

Comments
6 min read
Preventing AI Project Failures Through Effective Prompt Engineering

Preventing AI Project Failures Through Effective Prompt Engineering

1
Comments
5 min read
The 5 Steps of Threat Modeling in a Startup

The 5 Steps of Threat Modeling in a Startup

Comments
3 min read
EdgeVPN: A Decentralized P2P VPN Solution

EdgeVPN: A Decentralized P2P VPN Solution

Comments
1 min read
loading...