DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I audited 18 A2A agent cards. 17 graded F. Mine was the 18th.

I audited 18 A2A agent cards. 17 graded F. Mine was the 18th.

1
Comments
6 min read
DNS hijacking: when someone else answers in your domain's name

DNS hijacking: when someone else answers in your domain's name

Comments
5 min read
Why macOS Keeps Resetting Your Default Browser (and How to Fix It Forever)

Why macOS Keeps Resetting Your Default Browser (and How to Fix It Forever)

Comments
3 min read
TAP E2E Verify — Snowflake RBAC Automation Pipeline

TAP E2E Verify — Snowflake RBAC Automation Pipeline

Comments
2 min read
A HIPAA-safe alert pipeline checklist (8 controls)

A HIPAA-safe alert pipeline checklist (8 controls)

Comments
10 min read
When Scrapers Stop Forgetting: What Autobrowse Means for the Receiver Side

When Scrapers Stop Forgetting: What Autobrowse Means for the Receiver Side

Comments
5 min read
Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Building an Experimental TypeScript Cipher Inspired by 8 Dimensions

Comments
8 min read
Matter for smart home devices: architecture, security and OTA

Matter for smart home devices: architecture, security and OTA

Comments
2 min read
Hardware security for embedded devices: TPM and TrustZone

Hardware security for embedded devices: TPM and TrustZone

Comments
2 min read
The Patch-Velocity Gap: AI Discovery Is Outpacing OSS Patching

The Patch-Velocity Gap: AI Discovery Is Outpacing OSS Patching

Comments
4 min read
Secure OTA firmware updates with rollback for embedded devices

Secure OTA firmware updates with rollback for embedded devices

Comments
1 min read
--- title: I built a static XSS playground that runs payloads safely in the browser ---

--- title: I built a static XSS playground that runs payloads safely in the browser ---

Comments
1 min read
AI Agents and Compliance: What Security Teams Need to Know in 2026

AI Agents and Compliance: What Security Teams Need to Know in 2026

Comments
11 min read
How a Morse Code Attack Bypassed Bankr's LLM Agent: T1027 Obfuscation in the Wild

How a Morse Code Attack Bypassed Bankr's LLM Agent: T1027 Obfuscation in the Wild

Comments
11 min read
SunnyDayBPF: Post-Syscall User-Buffer Telemetry Deception with eBPF

SunnyDayBPF: Post-Syscall User-Buffer Telemetry Deception with eBPF

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.