DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
[Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀

[Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀

2
Comments
2 min read
SafeLine WAF: Performance Testing and Optimization

SafeLine WAF: Performance Testing and Optimization

6
Comments
4 min read
Our Journey with an Open-Source WAF Solution for Enterprise Security

Our Journey with an Open-Source WAF Solution for Enterprise Security

7
Comments
2 min read
Database Cybersecurity Best Practices & Solutions You Should Know

Database Cybersecurity Best Practices & Solutions You Should Know

Comments
5 min read
Exploits Ep-2: Exploiting XSS to Become Someone Else Online

Exploits Ep-2: Exploiting XSS to Become Someone Else Online

50
Comments 6
14 min read
Secure Your Website with SafeLine-Configuring on a Standalone Server

Secure Your Website with SafeLine-Configuring on a Standalone Server

7
Comments 2
2 min read
How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life

How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life

16
Comments 2
2 min read
Mastering Web Security on Linux: A Practical Guide to SafeLine WAF

Mastering Web Security on Linux: A Practical Guide to SafeLine WAF

6
Comments
2 min read
Ultimate Guide to Web Security on Linux Servers with SafeLine WAF

Ultimate Guide to Web Security on Linux Servers with SafeLine WAF

6
Comments
2 min read
The OSI and TCP/IP Network Reference Models 🌐Explained 🛠️

The OSI and TCP/IP Network Reference Models 🌐Explained 🛠️

6
Comments
3 min read
Explained: Microsoft Windows outage (CrowdStrike)

Explained: Microsoft Windows outage (CrowdStrike)

Comments
3 min read
How to Integrate Passkeys into Java Spring Boot

How to Integrate Passkeys into Java Spring Boot

1
Comments
4 min read
Stereotype of a Nigeria Hacker

Stereotype of a Nigeria Hacker

7
Comments 4
2 min read
Applied Data Science on data breaches + Bonus

Applied Data Science on data breaches + Bonus

Comments
2 min read
Deploying SafeLine WAF on CentOS 7 with Docker

Deploying SafeLine WAF on CentOS 7 with Docker

8
Comments 2
4 min read
Secure Your Website Effortlessly: The Community-Driven WAF Solution

Secure Your Website Effortlessly: The Community-Driven WAF Solution

6
Comments 2
2 min read
The Battle for Control of Cyberspace in Geopolitics

The Battle for Control of Cyberspace in Geopolitics

Comments
1 min read
Real-World Attack Testing with SafeLine: A Guide to Dynamic Protection

Real-World Attack Testing with SafeLine: A Guide to Dynamic Protection

5
Comments
2 min read
A Batalha pelo Controle do Ciberespaço na Geopolítica

A Batalha pelo Controle do Ciberespaço na Geopolítica

Comments
1 min read
Shield Your Web Apps with SafeLine: The Self-Hosted WAF

Shield Your Web Apps with SafeLine: The Self-Hosted WAF

6
Comments 2
2 min read
Scanning for Vulnerabilities: Linux Tools and Safe Exploitation for Penetration Testing

Scanning for Vulnerabilities: Linux Tools and Safe Exploitation for Penetration Testing

Comments
8 min read
IT Leaders' Guide: Mastering Advanced Microsegmentation

IT Leaders' Guide: Mastering Advanced Microsegmentation

Comments
6 min read
Protect Your Site with SafeLine: A Free, Open-Source WAF

Protect Your Site with SafeLine: A Free, Open-Source WAF

5
Comments
2 min read
Battle of the WAFs: Testing Detection and Performance Across Open-Source Firewalls

Battle of the WAFs: Testing Detection and Performance Across Open-Source Firewalls

6
Comments
4 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

7
Comments
3 min read
loading...