DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Non-Human Identity Security Strategy for Zero Trust Architecture

Non-Human Identity Security Strategy for Zero Trust Architecture

1
Comments
7 min read
Here's How Generative AI Can Be Used In Cybersecurity 00:25

Here's How Generative AI Can Be Used In Cybersecurity

7
Comments
1 min read
Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Comments 1
5 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
Remote Code Execution (RCE) in Laravel: Prevention & Example

Remote Code Execution (RCE) in Laravel: Prevention & Example

3
Comments
3 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

10
Comments
4 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

10
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

11
Comments
5 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

10
Comments
4 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

11
Comments
4 min read
End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

10
Comments
1 min read
How to Configure and Get Source IP in SafeLine WAF

How to Configure and Get Source IP in SafeLine WAF

6
Comments
2 min read
Transformation numérique, quel impact sur la sécurité des entreprises ?

Transformation numérique, quel impact sur la sécurité des entreprises ?

7
Comments
12 min read
Annoyed by AI Bots? A WAF Solution You've Never Seen

Annoyed by AI Bots? A WAF Solution You've Never Seen

6
Comments
4 min read
What each container does in SafeLine WAF

What each container does in SafeLine WAF

10
Comments
3 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

13
Comments 2
4 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
What Are Web Application Security Detection Rules?

What Are Web Application Security Detection Rules?

7
Comments
3 min read
Building Secure APIs: Best Practices for Data Protection

Building Secure APIs: Best Practices for Data Protection

1
Comments
4 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

10
Comments
5 min read
⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

1
Comments
3 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

11
Comments
5 min read
How to Select a WAF for New Webmasters(Part 1)

How to Select a WAF for New Webmasters(Part 1)

7
Comments
4 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
loading...