DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Comprehensive Analysis of Attack Events with SafeLine WAF

Comprehensive Analysis of Attack Events with SafeLine WAF

8
Comments
2 min read
Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

6
Comments
2 min read
Creating Malware in Python

Creating Malware in Python

3
Comments
1 min read
Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

6
Comments
2 min read
How to Verify User Accounts in Passkey-Based Systems

How to Verify User Accounts in Passkey-Based Systems

1
Comments
3 min read
TCP/IP Model vs OSI Model: A Detailed Comparison

TCP/IP Model vs OSI Model: A Detailed Comparison

3
Comments 1
4 min read
Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

7
Comments
2 min read
How AI in CRM enhances Customer Engagement?

How AI in CRM enhances Customer Engagement?

1
Comments
9 min read
Passkey One-Tap Login: The Most Efficient Login

Passkey One-Tap Login: The Most Efficient Login

Comments
2 min read
Social Engineering Attack

Social Engineering Attack

Comments
1 min read
Achieving Multi-WAF Protection and Failover Using SafeLine WAF

Achieving Multi-WAF Protection and Failover Using SafeLine WAF

6
Comments
3 min read
Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Comments
1 min read
Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

3
Comments
4 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Comments
2 min read
How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

5
Comments 1
2 min read
How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

6
Comments
3 min read
SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

10
Comments
3 min read
11.5K Stars! This Web Application Firewall Tool is Incredible!

11.5K Stars! This Web Application Firewall Tool is Incredible!

9
Comments
2 min read
Only 2 papers & 3 assessments to go.

Only 2 papers & 3 assessments to go.

Comments
2 min read
Simple, Easy-to-Use, and Open-Source Web Application Firewall

Simple, Easy-to-Use, and Open-Source Web Application Firewall

7
Comments
2 min read
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
IR Playbooks TryHackMe

IR Playbooks TryHackMe

8
Comments
3 min read
How to use PwnFox with Burp Suite

How to use PwnFox with Burp Suite

10
Comments
3 min read
My Journey with SafeLine: A Practical Tool for Web Security

My Journey with SafeLine: A Practical Tool for Web Security

8
Comments
2 min read
Exploring WAFs: How SafeLine Defends Against Web Attacks

Exploring WAFs: How SafeLine Defends Against Web Attacks

6
Comments
3 min read
loading...