DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Let's Make the Internet a Safer Place! State of Passkeys is Now Live on Product Hunt 🚀

Let's Make the Internet a Safer Place! State of Passkeys is Now Live on Product Hunt 🚀

1
Comments 2
2 min read
El Canario Digital: Descifrando los Silencios de Telegram

El Canario Digital: Descifrando los Silencios de Telegram

Comments
3 min read
Understanding IP Address Types, Subnets, and Loopback

Understanding IP Address Types, Subnets, and Loopback

2
Comments
2 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

2
Comments
4 min read
How to Configure HTTPS and DDoS Protection with SafeLine WAF

How to Configure HTTPS and DDoS Protection with SafeLine WAF

7
Comments
4 min read
Cybersecurity – Protecting Your Business in the Digital Age

Cybersecurity – Protecting Your Business in the Digital Age

Comments
4 min read
Types of DNS attacks

Types of DNS attacks

2
Comments
8 min read
DIY Deployment of SafeLine WAF on K8s

DIY Deployment of SafeLine WAF on K8s

7
Comments
3 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
How to Harden IaC Security with KICS

How to Harden IaC Security with KICS

Comments
6 min read
Top Cybersecurity Practices for 2024: Essential Strategies to Protect Your Digital Assets

Top Cybersecurity Practices for 2024: Essential Strategies to Protect Your Digital Assets

9
Comments 4
3 min read
A Free, Beginner-Friendly Web Protection Tool: SafeLine

A Free, Beginner-Friendly Web Protection Tool: SafeLine

6
Comments
2 min read
SafeLine WAF: Free, Powerful Web Security in a Few Clicks

SafeLine WAF: Free, Powerful Web Security in a Few Clicks

6
Comments
2 min read
Building a Cybersecurity Assistant using Lyzr SDK

Building a Cybersecurity Assistant using Lyzr SDK

Comments
3 min read
30 Day SOC Challenge - Day 1 : Logical Diagram

30 Day SOC Challenge - Day 1 : Logical Diagram

Comments 1
1 min read
Boost Your Website Security in 3 Minutes with SafeLine, the Open-Source WAF with 11.8K GitHub Stars

Boost Your Website Security in 3 Minutes with SafeLine, the Open-Source WAF with 11.8K GitHub Stars

6
Comments
2 min read
Looking for full-stack dev specializing to help build my XDR cybersecurity platform

Looking for full-stack dev specializing to help build my XDR cybersecurity platform

Comments
1 min read
Kriptografi

Kriptografi

Comments
3 min read
Understanding the CIA Triad: The Core Concepts of Cybersecurity

Understanding the CIA Triad: The Core Concepts of Cybersecurity

6
Comments 1
2 min read
Basic Cybersecurity Practices: How to Protect Your Digital Environment

Basic Cybersecurity Practices: How to Protect Your Digital Environment

5
Comments 1
2 min read
Why is Cybersecurity Important? Key Reasons to Protect Your Digital Life

Why is Cybersecurity Important? Key Reasons to Protect Your Digital Life

5
Comments 1
2 min read
Tutorial: How to Integrate Passkeys into Nuxt.js

Tutorial: How to Integrate Passkeys into Nuxt.js

1
Comments
3 min read
SafeLine: The No.1 Free and Open-Source Next-Gen Intelligent WAF

SafeLine: The No.1 Free and Open-Source Next-Gen Intelligent WAF

12
Comments
4 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Comments
4 min read
Secure Your Website with SafeLine: A Free and Easy-to-Use WAF

Secure Your Website with SafeLine: A Free and Easy-to-Use WAF

11
Comments 2
2 min read
What is Cybersecurity? A Beginner's Guide to Understanding Its Importance

What is Cybersecurity? A Beginner's Guide to Understanding Its Importance

5
Comments 1
2 min read
Comprehensive Guide to Installing, Configuring, and Testing SafeLine WAF

Comprehensive Guide to Installing, Configuring, and Testing SafeLine WAF

8
Comments
4 min read
ProxyChaining

ProxyChaining

Comments
3 min read
9 Common Cybersecurity Challenges and Their Solutions

9 Common Cybersecurity Challenges and Their Solutions

2
Comments 1
3 min read
My Experience with SafeLine Community Edition WAF

My Experience with SafeLine Community Edition WAF

6
Comments
2 min read
Enhance Your Cybersecurity with SafeLine: The Open-Source WAF You Can Trust

Enhance Your Cybersecurity with SafeLine: The Open-Source WAF You Can Trust

6
Comments
2 min read
SafeLine's FAQ Part 4: Other Issues

SafeLine's FAQ Part 4: Other Issues

7
Comments
4 min read
How SafeLine Leverages Nginx

How SafeLine Leverages Nginx

6
Comments
5 min read
The New WAF Choice for Developers: SafeLine

The New WAF Choice for Developers: SafeLine

6
Comments
3 min read
Cloud Security: Who’s Responsibility Is It?

Cloud Security: Who’s Responsibility Is It?

4
Comments
7 min read
Zero Trust Security: Revolutionizing Cyber Defense in 2024

Zero Trust Security: Revolutionizing Cyber Defense in 2024

Comments
3 min read
Nmap Script Engine (NSE) for Network Vulnerability Assessment

Nmap Script Engine (NSE) for Network Vulnerability Assessment

Comments
2 min read
Protect Your Site from Hackers with SafeLine: A Free and Open-Source WAF

Protect Your Site from Hackers with SafeLine: A Free and Open-Source WAF

8
Comments 1
3 min read
CVE-2022-26923 | TryHackMe

CVE-2022-26923 | TryHackMe

6
Comments
2 min read
Google Solves Passkeys' Cross-Platform Issue: Syncing Across Windows, macOS & Android

Google Solves Passkeys' Cross-Platform Issue: Syncing Across Windows, macOS & Android

2
Comments
2 min read
My Experience with SafeLine: A Powerful and Free Web Application Firewall

My Experience with SafeLine: A Powerful and Free Web Application Firewall

9
Comments
3 min read
The Curse of Von Neumann Architecture

The Curse of Von Neumann Architecture

Comments
1 min read
SSO Simplified: Enhancing Security and User Experience

SSO Simplified: Enhancing Security and User Experience

1
Comments
7 min read
How to Harden IaC Security with KICS

How to Harden IaC Security with KICS

Comments
6 min read
LMQL, AAAL Pt.6

LMQL, AAAL Pt.6

10
Comments
2 min read
Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Comments
1 min read
Diffie-Hellman Key Exchange (DHKE) Algorithm

Diffie-Hellman Key Exchange (DHKE) Algorithm

1
Comments
3 min read
It is easy to create a SOC team,but difficult to maintain it,listen why

It is easy to create a SOC team,but difficult to maintain it,listen why

1
Comments
4 min read
Desafio Pickle Rick - TryHackMe

Desafio Pickle Rick - TryHackMe

6
Comments 2
7 min read
How to Integrate Passkeys in Python (FastAPI)

How to Integrate Passkeys in Python (FastAPI)

9
Comments
4 min read
Keterampilan dan Pengetahuan Keamanan

Keterampilan dan Pengetahuan Keamanan

Comments
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Comments
2 min read
Software: Our SOC 2 journey

Software: Our SOC 2 journey

Comments
4 min read
Building a Secure WordPress Site with Docker, Nginx, and SafeLine WAF

Building a Secure WordPress Site with Docker, Nginx, and SafeLine WAF

8
Comments
2 min read
[Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀

[Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀

2
Comments
2 min read
SafeLine WAF: Performance Testing and Optimization

SafeLine WAF: Performance Testing and Optimization

6
Comments
4 min read
Our Journey with an Open-Source WAF Solution for Enterprise Security

Our Journey with an Open-Source WAF Solution for Enterprise Security

7
Comments
2 min read
Database Cybersecurity Best Practices & Solutions You Should Know

Database Cybersecurity Best Practices & Solutions You Should Know

Comments
5 min read
Exploits Ep-2: Exploiting XSS to Become Someone Else Online

Exploits Ep-2: Exploiting XSS to Become Someone Else Online

50
Comments 6
14 min read
loading...