DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding IP Address Types, Subnets, and Loopback

Understanding IP Address Types, Subnets, and Loopback

2
Comments
2 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

4
Comments
4 min read
How to Configure HTTPS and DDoS Protection with SafeLine WAF

How to Configure HTTPS and DDoS Protection with SafeLine WAF

7
Comments
4 min read
Cybersecurity – Protecting Your Business in the Digital Age

Cybersecurity – Protecting Your Business in the Digital Age

Comments
4 min read
Types of DNS attacks

Types of DNS attacks

2
Comments
8 min read
DIY Deployment of SafeLine WAF on K8s

DIY Deployment of SafeLine WAF on K8s

7
Comments
3 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
Top Cybersecurity Practices for 2024: Essential Strategies to Protect Your Digital Assets

Top Cybersecurity Practices for 2024: Essential Strategies to Protect Your Digital Assets

9
Comments 4
3 min read
A Free, Beginner-Friendly Web Protection Tool: SafeLine

A Free, Beginner-Friendly Web Protection Tool: SafeLine

6
Comments
2 min read
SafeLine WAF: Free, Powerful Web Security in a Few Clicks

SafeLine WAF: Free, Powerful Web Security in a Few Clicks

6
Comments
2 min read
Building a Cybersecurity Assistant using Lyzr SDK

Building a Cybersecurity Assistant using Lyzr SDK

Comments
3 min read
30 Day SOC Challenge - Day 1 : Logical Diagram

30 Day SOC Challenge - Day 1 : Logical Diagram

Comments 1
1 min read
Boost Your Website Security in 3 Minutes with SafeLine, the Open-Source WAF with 11.8K GitHub Stars

Boost Your Website Security in 3 Minutes with SafeLine, the Open-Source WAF with 11.8K GitHub Stars

6
Comments
2 min read
Looking for full-stack dev specializing to help build my XDR cybersecurity platform

Looking for full-stack dev specializing to help build my XDR cybersecurity platform

Comments
1 min read
Kriptografi

Kriptografi

Comments
3 min read
Understanding the CIA Triad: The Core Concepts of Cybersecurity

Understanding the CIA Triad: The Core Concepts of Cybersecurity

6
Comments 1
2 min read
Basic Cybersecurity Practices: How to Protect Your Digital Environment

Basic Cybersecurity Practices: How to Protect Your Digital Environment

5
Comments 1
2 min read
Why is Cybersecurity Important? Key Reasons to Protect Your Digital Life

Why is Cybersecurity Important? Key Reasons to Protect Your Digital Life

5
Comments 1
2 min read
Tutorial: How to Integrate Passkeys into Nuxt.js

Tutorial: How to Integrate Passkeys into Nuxt.js

1
Comments
3 min read
SafeLine: The No.1 Free and Open-Source Next-Gen Intelligent WAF

SafeLine: The No.1 Free and Open-Source Next-Gen Intelligent WAF

12
Comments
4 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Comments
4 min read
Secure Your Website with SafeLine: A Free and Easy-to-Use WAF

Secure Your Website with SafeLine: A Free and Easy-to-Use WAF

11
Comments 2
2 min read
What is Cybersecurity? A Beginner's Guide to Understanding Its Importance

What is Cybersecurity? A Beginner's Guide to Understanding Its Importance

5
Comments 1
2 min read
ProxyChaining

ProxyChaining

Comments
3 min read
loading...