DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ModSecurity + SafeLine WAF for Multi-layer Defense (2)

ModSecurity + SafeLine WAF for Multi-layer Defense (2)

6
Comments
3 min read
ModSecurity + SafeLine WAF for Multi-layer Defense (1)

ModSecurity + SafeLine WAF for Multi-layer Defense (1)

6
Comments
6 min read
Top 5 Cybersecurity Certifications to Boost Your Career

Top 5 Cybersecurity Certifications to Boost Your Career

5
Comments
2 min read
Jenkins File Read Vulnerability - CVE-2024-23897

Jenkins File Read Vulnerability - CVE-2024-23897

5
Comments
2 min read
Setting Up SafeLine: Best Practices for Secure Web Traffic

Setting Up SafeLine: Best Practices for Secure Web Traffic

9
Comments
3 min read
Transform Your Server into a High-Security Fortress with SafeLine WAF

Transform Your Server into a High-Security Fortress with SafeLine WAF

5
Comments
2 min read
Practical Example of Escaping XSS Context

Practical Example of Escaping XSS Context

5
Comments 2
4 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Comments
3 min read
How Semantic Analysis Works in SafeLine WAF

How Semantic Analysis Works in SafeLine WAF

14
Comments
2 min read
What is a Web Application Gateway

What is a Web Application Gateway

6
Comments
2 min read
Top 10 Web Application Gateways 2025

Top 10 Web Application Gateways 2025

5
Comments
3 min read
A Comprehensive Guide to Understand Penetration Testing

A Comprehensive Guide to Understand Penetration Testing

3
Comments
4 min read
How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)

How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)

2
Comments
5 min read
What are OSI Model and HTTP Request for Beginners

What are OSI Model and HTTP Request for Beginners

13
Comments 4
5 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Beginners' Guide to Understand Web Crawlers and Bots (2)

Beginners' Guide to Understand Web Crawlers and Bots (2)

2
Comments
3 min read
Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Comments
2 min read
Where Should I Start with Cybersecurity

Where Should I Start with Cybersecurity

3
Comments
5 min read
Load Balancing with Reverse Proxy

Load Balancing with Reverse Proxy

2
Comments
3 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

12
Comments
3 min read
Polyfills - a filler or a gaping hole? (Part-2)

Polyfills - a filler or a gaping hole? (Part-2)

Comments
5 min read
Demystifying XDR for MSPs: A Practical Guide

Demystifying XDR for MSPs: A Practical Guide

Comments
4 min read
TCP/IP Networking Model

TCP/IP Networking Model

6
Comments 1
5 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
loading...