close

DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Debugging Distroless Containers: kubectl debug, Ephemeral Containers, and When to Use Each

Debugging Distroless Containers: kubectl debug, Ephemeral Containers, and When to Use Each

Comments
7 min read
Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)

Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)

Image 1
Comments
9 min read
Gas Bomb in Starknet: How One Unbounded Loop Can Brick Your Staking Protocol

Gas Bomb in Starknet: How One Unbounded Loop Can Brick Your Staking Protocol

Comments
2 min read
Why Consumers Keep Falling for Online Scams and How Technology Can Help.

Why Consumers Keep Falling for Online Scams and How Technology Can Help.

Comments
8 min read
JGuardrails 1.0.0 — Hardening Java LLM Apps Against Jailbreaks, Toxicity, and Prompt Injection

JGuardrails 1.0.0 — Hardening Java LLM Apps Against Jailbreaks, Toxicity, and Prompt Injection

Comments
7 min read
We Built a Free Website Health Scanner. Here's What It Finds on Most Sites

We Built a Free Website Health Scanner. Here's What It Finds on Most Sites

Comments
5 min read
Securing AI Agents: A Practical Guide for IT Leaders

Securing AI Agents: A Practical Guide for IT Leaders

Comments
7 min read
Cybersecurity Looks Like Proof of Work Now — And That Should Scare You

Cybersecurity Looks Like Proof of Work Now — And That Should Scare You

Comments
7 min read
How to Secure Claude CLI When It Runs Inside Your Software (don't ask)

How to Secure Claude CLI When It Runs Inside Your Software (don't ask)

Comments
3 min read
Zero Trust Architecture: Why Good Intentions Are Not Enough

Zero Trust Architecture: Why Good Intentions Are Not Enough

Comments
15 min read
Bridging the Gap: Converting SPDX 3.0 to 2.3 in the Software Supply Chain

Bridging the Gap: Converting SPDX 3.0 to 2.3 in the Software Supply Chain

Comments
3 min read
GHSA-JJ6C-8H6C-HPPX: GHSA-JJ6C-8H6C-HPPX: Uncontrolled Resource Consumption in pypdf via Malformed PDF Streams

GHSA-JJ6C-8H6C-HPPX: GHSA-JJ6C-8H6C-HPPX: Uncontrolled Resource Consumption in pypdf via Malformed PDF Streams

Comments
2 min read
Privacy-First Security: Classifying Encrypted Tunnel Traffic Without Breaking the Seal

Privacy-First Security: Classifying Encrypted Tunnel Traffic Without Breaking the Seal

Image 1
Comments
14 min read
Modern API Security: Why Traditional Authentication Fails Against BOLA (Broken Object Level Authorization)

Modern API Security: Why Traditional Authentication Fails Against BOLA (Broken Object Level Authorization)

Comments
4 min read
Launching gh-dep-risk: a GitHub CLI extension for npm dependency PR review

Launching gh-dep-risk: a GitHub CLI extension for npm dependency PR review

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.