DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How a WooCommerce Store Survived Real-World Attacks with SafeLine WAF

How a WooCommerce Store Survived Real-World Attacks with SafeLine WAF

5
Comments
3 min read
Understanding Business Logic Attacks in SaaS and How to Prevent Them

Understanding Business Logic Attacks in SaaS and How to Prevent Them

Comments
4 min read
SafeLine WAF: A Quick Nginx Setup That Secures WordPress in 30 Minutes

SafeLine WAF: A Quick Nginx Setup That Secures WordPress in 30 Minutes

Comments
2 min read
The Free WAF Everyone’s Grabbing: 1ms Protection, Zero Rules, and a 30-Minute Learning Curve

The Free WAF Everyone’s Grabbing: 1ms Protection, Zero Rules, and a 30-Minute Learning Curve

Comments
3 min read
Upgraded My Homelab Web Security with SafeLine WAF

Upgraded My Homelab Web Security with SafeLine WAF

Comments
1 min read
🧠 How User-Space and Kernel-Space Affect Security in Linux

🧠 How User-Space and Kernel-Space Affect Security in Linux

Comments
3 min read
🛡️ Advanced Web Data Collection: Building PhantomCollect for Security Research

🛡️ Advanced Web Data Collection: Building PhantomCollect for Security Research

Comments
3 min read
Form Security Best Practices: Protecting Your Web Forms from Attacks

Form Security Best Practices: Protecting Your Web Forms from Attacks

Comments
14 min read
Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Comments
2 min read
When a seemingly innoffensive conversation with AI turns malicious

When a seemingly innoffensive conversation with AI turns malicious

Comments
2 min read
SafeLine WAF Builds a Unified Identity Authentication Hub

SafeLine WAF Builds a Unified Identity Authentication Hub

Comments
2 min read
What Is My IP Address?

What Is My IP Address?

2
Comments
7 min read
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Comments
1 min read
My First Step Into Cybersecurity

My First Step Into Cybersecurity

Comments
1 min read
🔐 Exploring Wi‑Fi Security Safely: A Beginner‑Friendly Guide to the WiFi‑Lab Controller (with GUI!)

🔐 Exploring Wi‑Fi Security Safely: A Beginner‑Friendly Guide to the WiFi‑Lab Controller (with GUI!)

5
Comments 1
4 min read
Cybersecurity tools: SIEM or are companies really spying on us

Cybersecurity tools: SIEM or are companies really spying on us

Comments 1
7 min read
Everyone Talks About Clean Architecture — No One Fixes the Data Layer

Everyone Talks About Clean Architecture — No One Fixes the Data Layer

Comments
1 min read
A Self-Hosted Alternative to Cloudflare

A Self-Hosted Alternative to Cloudflare

6
Comments
3 min read
DNS: The Application Layer That Translates the Internet

DNS: The Application Layer That Translates the Internet

Comments
8 min read
📚 An In-Depth Guide to Modern Cryptography and Web Security

📚 An In-Depth Guide to Modern Cryptography and Web Security

Comments
5 min read
React2Shell: A Deep Dive into Critical React Server Components Vulnerabilities (Late 2025)

React2Shell: A Deep Dive into Critical React Server Components Vulnerabilities (Late 2025)

7
Comments
3 min read
Building a Virtualized Cybersecurity Lab: Introducing an Adversary with Kali Linux

Building a Virtualized Cybersecurity Lab: Introducing an Adversary with Kali Linux

Comments
5 min read
Why Your Website Loses Sales Even With Perfect SEO: The Blacklist Problem

Why Your Website Loses Sales Even With Perfect SEO: The Blacklist Problem

Comments
4 min read
Non-functional Application Requirements: Compliance

Non-functional Application Requirements: Compliance

1
Comments
13 min read
Weekend Project- Building a Serverless Phishing Detector for Google's Cloud Run Hackathon

Weekend Project- Building a Serverless Phishing Detector for Google's Cloud Run Hackathon

Comments
3 min read
loading...