close

DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Proving What Your AI Agent Did: Introducing Traceseal

Proving What Your AI Agent Did: Introducing Traceseal

Comments
2 min read
We Scanned 200 SMB Domains. Here's What We Found.

We Scanned 200 SMB Domains. Here's What We Found.

Comments
5 min read
GPT-5.4-Cyber and Mythos Are Here. Who Governs the Defenders' AI Agents?

GPT-5.4-Cyber and Mythos Are Here. Who Governs the Defenders' AI Agents?

Comments
5 min read
Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring

Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring

Comments
6 min read
How to Defend Your AI Agent Against Prompt Injection

How to Defend Your AI Agent Against Prompt Injection

BERJAYA 1
Comments 1
4 min read
Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform

Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform

Comments
3 min read
Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Comments
8 min read
Vibe Coding Security: What Happens When Developers Trust AI Too Much

Vibe Coding Security: What Happens When Developers Trust AI Too Much

Comments
10 min read
When Third Party Support Becomes Your Weakest Point: April 2026 Security Breach

When Third Party Support Becomes Your Weakest Point: April 2026 Security Breach

Comments
3 min read
5 Smart Contract Vulnerabilities That AI Catches Better Than Static Analyzers

5 Smart Contract Vulnerabilities That AI Catches Better Than Static Analyzers

Comments
3 min read
Why Polaris Never Touches Your Cloud Credentials: Storage Config Internals

Why Polaris Never Touches Your Cloud Credentials: Storage Config Internals

Comments
8 min read
AI applications need more than logs: they need tighter control boundaries

AI applications need more than logs: they need tighter control boundaries

BERJAYA 1
Comments 1
1 min read
Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)

Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)

BERJAYA 1
Comments
9 min read
Debugging Distroless Containers: kubectl debug, Ephemeral Containers, and When to Use Each

Debugging Distroless Containers: kubectl debug, Ephemeral Containers, and When to Use Each

Comments
7 min read
HAProxy HTTP/3 Desync, Prompt Injection Dataset, & Entra ID Hardening

HAProxy HTTP/3 Desync, Prompt Injection Dataset, & Entra ID Hardening

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.