DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Bitwarden CLI Compromised: What Developers Need to Know About the Ongoing Checkmarx Supply Chain Attack

Bitwarden CLI Compromised: What Developers Need to Know About the Ongoing Checkmarx Supply Chain Attack

Comments
6 min read
The Execution Pipeline: A Secured Journey for Every Call

The Execution Pipeline: A Secured Journey for Every Call

Comments
3 min read
Supply Chain Attacks Plague npm, Cloud Devs Expose Thousands of Secrets

Supply Chain Attacks Plague npm, Cloud Devs Expose Thousands of Secrets

Comments
3 min read
keygate: A Fast Pre-Commit Guardrail Against Secret Leaks

keygate: A Fast Pre-Commit Guardrail Against Secret Leaks

1
Comments
3 min read
Secure System Design -- 14 Challenges

Secure System Design -- 14 Challenges

Comments
31 min read
Subdomain Takeover Explained (and How to Fix It)

Subdomain Takeover Explained (and How to Fix It)

Comments
3 min read
WordPress Suspicious MU-Plugin Malware: menu-queue-bit.php and “Compact Extension Vox”

WordPress Suspicious MU-Plugin Malware: menu-queue-bit.php and “Compact Extension Vox”

Comments
8 min read
OSINT Content Discovery: Why You Need to Know What's Publicly Exposed About Your Web Assets

OSINT Content Discovery: Why You Need to Know What's Publicly Exposed About Your Web Assets

Comments
7 min read
Cómo asegurar un sistema a través de certificados mTLS (Mutual TLS)

Cómo asegurar un sistema a través de certificados mTLS (Mutual TLS)

Comments
9 min read
Eliminating Static AWS Credentials From GitHub Actions With OIDC and Terragrunt

Eliminating Static AWS Credentials From GitHub Actions With OIDC and Terragrunt

1
Comments
12 min read
Blueprint: Designing Developer-Friendly API Authentication

Blueprint: Designing Developer-Friendly API Authentication

1
Comments
2 min read
48 Hours After Publishing: Second-Order Injection Field Notes

48 Hours After Publishing: Second-Order Injection Field Notes

1
Comments
2 min read
If your refresh token gets stolen, rotation alone won't save you — here's what does

If your refresh token gets stolen, rotation alone won't save you — here's what does

Comments
2 min read
Reverse Engineering a Modern Phishing Kit (2026 Edition)

Reverse Engineering a Modern Phishing Kit (2026 Edition)

Comments
8 min read
Your security tool should tell users what to change, not just what's wrong

Your security tool should tell users what to change, not just what's wrong

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.