DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Demystifying XDR for MSPs: A Practical Guide

Demystifying XDR for MSPs: A Practical Guide

Comments
4 min read
TCP/IP Networking Model

TCP/IP Networking Model

2
Comments 1
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)

10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)

Comments
2 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

12
Comments
1 min read
SafeLine WAF: Network Traffic Scrubbing

SafeLine WAF: Network Traffic Scrubbing

6
Comments
3 min read
Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

1
Comments
4 min read
SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

8
Comments
3 min read
Artificial General Intelligence: The Future of AI for Developers

Artificial General Intelligence: The Future of AI for Developers

3
Comments
2 min read
Is it possible to eliminate phishing?

Is it possible to eliminate phishing?

Comments
1 min read
Building a Botnet Simulation: Because Learning About Cybersecurity Shouldn’t Be Boring

Building a Botnet Simulation: Because Learning About Cybersecurity Shouldn’t Be Boring

Comments
5 min read
A Reliable Anti-Scraping Tool: My Experience with SafeLine

A Reliable Anti-Scraping Tool: My Experience with SafeLine

8
Comments 2
2 min read
How do I save my website from getting hacked?

How do I save my website from getting hacked?

2
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
Unlock New Capabilities with SafeLine 6.7.0

Unlock New Capabilities with SafeLine 6.7.0

7
Comments
2 min read
How Does WAF Prevent XSS Attacks

How Does WAF Prevent XSS Attacks

2
Comments
5 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
The Power of Reconnaissance in Cyber Security: Why You Should Prioritize Recon

The Power of Reconnaissance in Cyber Security: Why You Should Prioritize Recon

Comments
1 min read
Every Cyber Attack and how to prevent from them

Every Cyber Attack and how to prevent from them

6
Comments
5 min read
How to Deploy SafeLine WAF on Ubuntu

How to Deploy SafeLine WAF on Ubuntu

6
Comments
2 min read
Addressing Arbitrary Input with SafeLine

Addressing Arbitrary Input with SafeLine

1
Comments 1
3 min read
Web Application Firewall

Web Application Firewall

10
Comments
4 min read
Top 5 Website Data Leakage Events 2024

Top 5 Website Data Leakage Events 2024

2
Comments
2 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
Hi, I'm Dan!

Hi, I'm Dan!

1
Comments
1 min read
SafeLine WAF: How to Protect Your Website Dynamically

SafeLine WAF: How to Protect Your Website Dynamically

16
Comments
3 min read
What is Dynamic Protection in SafeLine WAF

What is Dynamic Protection in SafeLine WAF

5
Comments
2 min read
Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

6
Comments
2 min read
5 Use Cases for Using Open Policy Agent

5 Use Cases for Using Open Policy Agent

Comments
7 min read
AI against Daunting Security: The Future of Self-Rule Hacking

AI against Daunting Security: The Future of Self-Rule Hacking

5
Comments
1 min read
What is a subnet? | How subnetting works

What is a subnet? | How subnetting works

4
Comments
7 min read
Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

2
Comments
15 min read
How to Run Open Source WAF SafeLine on K8s

How to Run Open Source WAF SafeLine on K8s

9
Comments
4 min read
Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

10
Comments
4 min read
Why You Need to Protect Your Website and How

Why You Need to Protect Your Website and How

6
Comments
3 min read
Discover What's New in SafeLine 6.8.0

Discover What's New in SafeLine 6.8.0

5
Comments
1 min read
Why is HTTP not secure? | HTTP vs. HTTPS

Why is HTTP not secure? | HTTP vs. HTTPS

5
Comments
3 min read
Mastering Code: Why Programming is Indispensable in Cybersecurity

Mastering Code: Why Programming is Indispensable in Cybersecurity

1
Comments 1
1 min read
Dealing with Frontend Security Issues

Dealing with Frontend Security Issues

Comments
4 min read
Tutorial: Implement Authentication in Next.js

Tutorial: Implement Authentication in Next.js

1
Comments
43 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

6
Comments
2 min read
Network Security Enforcement and Best Practices.

Network Security Enforcement and Best Practices.

1
Comments
4 min read
Using Open Source WAF to Address Crawlers Occupying Significant Network Bandwidth

Using Open Source WAF to Address Crawlers Occupying Significant Network Bandwidth

6
Comments
3 min read
Five Free WAF Performance Comparison

Five Free WAF Performance Comparison

2
Comments
4 min read
Four Common Deployment Modes of WAF

Four Common Deployment Modes of WAF

4
Comments
4 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
What is Responsible AI?

What is Responsible AI?

1
Comments
11 min read
First Impressions of SafeLine: The Most Starred Open-Source WAF on GitHub

First Impressions of SafeLine: The Most Starred Open-Source WAF on GitHub

5
Comments
3 min read
Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

5
Comments
5 min read
How AI and Security are intertwined in todays tech world.

How AI and Security are intertwined in todays tech world.

1
Comments
3 min read
Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Highly Recommended Open-Source WAF: SafeLine

Highly Recommended Open-Source WAF: SafeLine

6
Comments 1
2 min read
Comprehensive Analysis of Attack Events with SafeLine WAF

Comprehensive Analysis of Attack Events with SafeLine WAF

8
Comments
2 min read
Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

6
Comments
2 min read
Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

6
Comments
2 min read
Creating Malware in Python

Creating Malware in Python

3
Comments
1 min read
How to Verify User Accounts in Passkey-Based Systems

How to Verify User Accounts in Passkey-Based Systems

1
Comments
3 min read
TCP/IP Model vs OSI Model: A Detailed Comparison

TCP/IP Model vs OSI Model: A Detailed Comparison

2
Comments 1
4 min read
Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

8
Comments
2 min read
How AI in CRM enhances Customer Engagement?

How AI in CRM enhances Customer Engagement?

1
Comments
9 min read
loading...