DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

5
Comments
5 min read
Understand the terminologies of in CS

Understand the terminologies of in CS

3
Comments
3 min read
Safeguard Your Website with SafeLine

Safeguard Your Website with SafeLine

7
Comments
4 min read
Multi-Factor Authentication(MFA)

Multi-Factor Authentication(MFA)

Comments
2 min read
Tech Spotlight: Daily Tech News 00:12

Tech Spotlight: Daily Tech News

12
Comments
1 min read
Simple and Easy-to-Use Web Security Gateway

Simple and Easy-to-Use Web Security Gateway

5
Comments
2 min read
Subnetting Basics Guide

Subnetting Basics Guide

6
Comments
3 min read
How Infrastructure Monitoring Can Prevent a Cyber Attack

How Infrastructure Monitoring Can Prevent a Cyber Attack

1
Comments
4 min read
Is this thing on?

Is this thing on?

Comments
1 min read
Hack The Box Writeup: Heist

Hack The Box Writeup: Heist

Comments
13 min read
Sage Hosting vs On-Premises: A Data-Driven Analysis

Sage Hosting vs On-Premises: A Data-Driven Analysis

Comments
4 min read
Unlock the Ultimate Free WAF: Secure Your Site Like a Pro

Unlock the Ultimate Free WAF: Secure Your Site Like a Pro

1
Comments
4 min read
Strengthen Your Web Security with SafeLine WAF on CentOS7

Strengthen Your Web Security with SafeLine WAF on CentOS7

7
Comments
3 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Determine the type of attack

Determine the type of attack

1
Comments 1
2 min read
Using LLMs For Kubernetes: Enter k8sgpt

Using LLMs For Kubernetes: Enter k8sgpt

46
Comments
4 min read
Robots and CAPTCHA: Why AI Can’t Click ‘I’m Not a Robot’ on Websites

Robots and CAPTCHA: Why AI Can’t Click ‘I’m Not a Robot’ on Websites

2
Comments
4 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
Crypto Authentication with Passkeys (Smart Wallets)

Crypto Authentication with Passkeys (Smart Wallets)

2
Comments 2
3 min read
Guarding Your APIs: Mastering WAF and API Gateway Integration

Guarding Your APIs: Mastering WAF and API Gateway Integration

17
Comments
3 min read
Boost Kubernetes Security: Deploying SafeLine WAF with Ingress-nginx

Boost Kubernetes Security: Deploying SafeLine WAF with Ingress-nginx

16
Comments 1
3 min read
User Agent Reduction in Chrome, Safari & Firefox

User Agent Reduction in Chrome, Safari & Firefox

8
Comments 2
3 min read
What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
Common Ports and Protocols

Common Ports and Protocols

44
Comments 2
3 min read
loading...