DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Scanning for Vulnerabilities: Linux Tools and Safe Exploitation for Penetration Testing

Scanning for Vulnerabilities: Linux Tools and Safe Exploitation for Penetration Testing

Comments
8 min read
IT Leaders' Guide: Mastering Advanced Microsegmentation

IT Leaders' Guide: Mastering Advanced Microsegmentation

Comments
6 min read
Protect Your Site with SafeLine: A Free, Open-Source WAF

Protect Your Site with SafeLine: A Free, Open-Source WAF

5
Comments
2 min read
Battle of the WAFs: Testing Detection and Performance Across Open-Source Firewalls

Battle of the WAFs: Testing Detection and Performance Across Open-Source Firewalls

6
Comments
4 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

7
Comments
3 min read
3 Security Teams To Think About Implementing For Your Organization

3 Security Teams To Think About Implementing For Your Organization

2
Comments
3 min read
SafeLine WAF: Easy Installation and Pro-Level Web Protection

SafeLine WAF: Easy Installation and Pro-Level Web Protection

8
Comments
2 min read
A Free and Powerful WAF Solution for Web Security-SafeLine

A Free and Powerful WAF Solution for Web Security-SafeLine

5
Comments
3 min read
Understanding Software Activation and Cracking Techniques

Understanding Software Activation and Cracking Techniques

2
Comments
8 min read
Meme Monday

Meme Monday

11
Comments 1
1 min read
How to Install and Configure SafeLine WAF: A Quick Start Guide

How to Install and Configure SafeLine WAF: A Quick Start Guide

8
Comments
2 min read
Discover SafeLine: The Most Popular Free WAF on GitHub

Discover SafeLine: The Most Popular Free WAF on GitHub

8
Comments
3 min read
Transform Your Website Security with SafeLine WAF's Advanced Protection Features

Transform Your Website Security with SafeLine WAF's Advanced Protection Features

11
Comments
2 min read
Ethical Hacking : Users password cracking

Ethical Hacking : Users password cracking

4
Comments
17 min read
AI and Cybersecurity: Navigating the Evolving Landscape

AI and Cybersecurity: Navigating the Evolving Landscape

Comments
3 min read
Step-by-Step Deployment and Configuration for Optimal Web Security

Step-by-Step Deployment and Configuration for Optimal Web Security

10
Comments
2 min read
How do I keep my digital life safe? (And you should too)

How do I keep my digital life safe? (And you should too)

3
Comments 5
5 min read
PURPOSELY Exploiting A Kubernetes Cluster

PURPOSELY Exploiting A Kubernetes Cluster

14
Comments
6 min read
A Powerful, Open-Source WAF to Boost Your Website's Security

A Powerful, Open-Source WAF to Boost Your Website's Security

7
Comments 1
4 min read
Why SafeLine Could Be the Best Free WAF for Your Website

Why SafeLine Could Be the Best Free WAF for Your Website

6
Comments
2 min read
Don’t Blame the Developer: Lessons from CrowdStrike

Don’t Blame the Developer: Lessons from CrowdStrike

1
Comments 1
1 min read
The Ultimate Free WAF For Webmaster-SafeLine

The Ultimate Free WAF For Webmaster-SafeLine

7
Comments
2 min read
How SafeLine Shields Your Website with Advanced Dynamic Protection

How SafeLine Shields Your Website with Advanced Dynamic Protection

6
Comments
2 min read
What is the Role of Authentication in Cybersecurity

What is the Role of Authentication in Cybersecurity

Comments
4 min read
What is the Role of Authentication in Cybersecurity

What is the Role of Authentication in Cybersecurity

Comments
4 min read
Boost Your Website Security for Free with SafeLine WAF

Boost Your Website Security for Free with SafeLine WAF

6
Comments
3 min read
The Role of AI in Cybersecurity: Defending Against the Next Generation of Attacks

The Role of AI in Cybersecurity: Defending Against the Next Generation of Attacks

Comments
1 min read
How to Replace the Default Self-Signed Certificate on SafeLine WAF

How to Replace the Default Self-Signed Certificate on SafeLine WAF

6
Comments
2 min read
SafeLine's FAQ Part 2: Installation and Upgrade Issues

SafeLine's FAQ Part 2: Installation and Upgrade Issues

6
Comments 2
4 min read
SafeLine's FAQ Part 3: Login and Configuration Issues

SafeLine's FAQ Part 3: Login and Configuration Issues

6
Comments
2 min read
How the Web Bluetooth API Enhances Passkeys

How the Web Bluetooth API Enhances Passkeys

Comments
2 min read
SafeLine: Secure Your Web Applications Effortlessly

SafeLine: Secure Your Web Applications Effortlessly

6
Comments
2 min read
SafeLine's FAQ Part 1: IP Address and Traffic Statistics

SafeLine's FAQ Part 1: IP Address and Traffic Statistics

6
Comments
3 min read
Alien biohazard approach to security

Alien biohazard approach to security

Comments
2 min read
SafeLine: A User-Friendly, Free Web Security WAF Solution

SafeLine: A User-Friendly, Free Web Security WAF Solution

6
Comments
3 min read
What is Cloud Security? Explore its Benefits, Risks, Threats and Challenges

What is Cloud Security? Explore its Benefits, Risks, Threats and Challenges

Comments
1 min read
Why are CTFs so important???

Why are CTFs so important???

Comments
2 min read
Digital Engineering Trends 2024

Digital Engineering Trends 2024

1
Comments
5 min read
Exploiting (Pentesting) An AWS EKS Cluster

Exploiting (Pentesting) An AWS EKS Cluster

11
Comments 1
3 min read
SafeLine WAF: A Powerful, Free Web Application Firewall

SafeLine WAF: A Powerful, Free Web Application Firewall

6
Comments
2 min read
SafeLine WAF Optimization Tips: A Practical Guide for System Operators

SafeLine WAF Optimization Tips: A Practical Guide for System Operators

7
Comments
2 min read
Understand Common Web Attacks and Strengthen Defense with SafeLine WAF

Understand Common Web Attacks and Strengthen Defense with SafeLine WAF

7
Comments
2 min read
Integration of Artificial Intelligence and Machine Learning in Cloud Security

Integration of Artificial Intelligence and Machine Learning in Cloud Security

Comments
5 min read
Cybersecurity: Online Attacks And Best Practices

Cybersecurity: Online Attacks And Best Practices

Comments
7 min read
Exploring Common Deployment Models for Web Application Firewalls (WAF)

Exploring Common Deployment Models for Web Application Firewalls (WAF)

7
Comments
3 min read
Quickly Integrate Free WAF with Nginx

Quickly Integrate Free WAF with Nginx

8
Comments
3 min read
How I Secured My Website with SafeLine WAF: A Beginner’s Guide to Easy Deployment

How I Secured My Website with SafeLine WAF: A Beginner’s Guide to Easy Deployment

8
Comments
2 min read
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

4
Comments
4 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
PHP Secure Coding: Don't Let the Code Get Loose

PHP Secure Coding: Don't Let the Code Get Loose

16
Comments 5
4 min read
Securing Your DevOps: Lessons from a Close Call

Securing Your DevOps: Lessons from a Close Call

Comments
2 min read
HTB Academy: Password Attacks Module – Password Reuse/Default Passwords

HTB Academy: Password Attacks Module – Password Reuse/Default Passwords

5
Comments
1 min read
Cryptography Concepts Simplified

Cryptography Concepts Simplified

Comments
2 min read
Understanding the Linux File System and Logs

Understanding the Linux File System and Logs

Comments
2 min read
AppSec: The Security Specialty That Rules Them All

AppSec: The Security Specialty That Rules Them All

4
Comments
5 min read
Securing the Digital Frontier: Top 10 Web App Vulnerabilities and How to Fix Them

Securing the Digital Frontier: Top 10 Web App Vulnerabilities and How to Fix Them

1
Comments 1
11 min read
Getting Started with SafeLine: Adding Protected Sites

Getting Started with SafeLine: Adding Protected Sites

7
Comments
3 min read
Getting Started with Free WAF: Configuring HTTP to HTTPS Redirection for Your Site

Getting Started with Free WAF: Configuring HTTP to HTTPS Redirection for Your Site

7
Comments
2 min read
Examining Data About the Linux System

Examining Data About the Linux System

Comments 2
2 min read
Solving Bandwidth Issues Caused by Web Crawlers with SafeLine WAF

Solving Bandwidth Issues Caused by Web Crawlers with SafeLine WAF

6
Comments
3 min read
loading...