DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering SQLMap Tamper Scripts: The Ultimate Guide to Evading WAFs Like a Pro [Must Read Article]

Mastering SQLMap Tamper Scripts: The Ultimate Guide to Evading WAFs Like a Pro [Must Read Article]

5
Comments
3 min read
TryHackMe API Wizard Breach Walkthrough

TryHackMe API Wizard Breach Walkthrough

Comments
4 min read
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

5
Comments
2 min read
The DevOps Guide to WAF API Gateways

The DevOps Guide to WAF API Gateways

Comments
8 min read
Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

4
Comments
3 min read
What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

What Are Blacklist, Whitelist, Greylist, and Monitor Mode in Cybersecurity?

5
Comments
3 min read
Understanding Zero-Trust Architecture (ZTA)

Understanding Zero-Trust Architecture (ZTA)

4
Comments
4 min read
Anti Bot Protection with SafeLine 7.0

Anti Bot Protection with SafeLine 7.0

6
Comments
3 min read
𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Here's How Generative AI Can Be Used In Cybersecurity 00:25

Here's How Generative AI Can Be Used In Cybersecurity

7
Comments
1 min read
Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Comments 1
5 min read
Advanced WAF Not Fully Based on Rules or Signatures

Advanced WAF Not Fully Based on Rules or Signatures

6
Comments
2 min read
QPS for Beginners

QPS for Beginners

10
Comments
3 min read
Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

Part 9: Cross-Site Scripting (XSS) Series - Real-World XSS Case Studies – Notable Breaches and Lessons Learned

10
Comments
4 min read
Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

Part 10: Cross-Site Scripting (XSS) Series - The Future of XSS: Evolving Techniques and Defenses.

6
Comments
4 min read
Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

Part 8: Cross-Site Scripting (XSS) Series - Protecting Against XSS: Defense Strategies

5
Comments
4 min read
Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

Part 7: Cross-Site Scripting (XSS) Series - XSS Payloads and Advanced Techniques

5
Comments
5 min read
End Of Series: Mastering Cross-Site Scripting (XSS)

End Of Series: Mastering Cross-Site Scripting (XSS)

8
Comments
1 min read
Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

Part 6: Cross-Site Scripting (XSS) Series -DOM-based XSS – Understanding Client-Side Vulnerabilities

6
Comments
4 min read
How to Configure and Get Source IP in SafeLine WAF

How to Configure and Get Source IP in SafeLine WAF

6
Comments
2 min read
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

5
Comments
4 min read
Transformation numérique, quel impact sur la sécurité des entreprises ?

Transformation numérique, quel impact sur la sécurité des entreprises ?

7
Comments
12 min read
Annoyed by AI Bots? A WAF Solution You've Never Seen

Annoyed by AI Bots? A WAF Solution You've Never Seen

6
Comments
4 min read
What each container does in SafeLine WAF

What each container does in SafeLine WAF

10
Comments
3 min read
A Definitive Guide to API Pentesting by Sekurno

A Definitive Guide to API Pentesting by Sekurno

7
Comments
10 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
What Are Web Application Security Detection Rules?

What Are Web Application Security Detection Rules?

7
Comments
3 min read
Building Secure APIs: Best Practices for Data Protection

Building Secure APIs: Best Practices for Data Protection

1
Comments
4 min read
⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

1
Comments
3 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

8
Comments
4 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

5
Comments
5 min read
Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

13
Comments
4 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

6
Comments
5 min read
How to Migrate Data from One SafeLine to Another

How to Migrate Data from One SafeLine to Another

5
Comments
2 min read
Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!

Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!

1
Comments
2 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

1
Comments
3 min read
Australian Parliament's Bill to Ban Social Media for Under-16s is Two-pronged

Australian Parliament's Bill to Ban Social Media for Under-16s is Two-pronged

1
Comments
4 min read
Phishing And Malware - A Practical Dive

Phishing And Malware - A Practical Dive

5
Comments
3 min read
How to detect wildcard security vulnerabilities

How to detect wildcard security vulnerabilities

1
Comments
3 min read
Mastering SSH Tunneling: A Guide to Securing Your Network Traffic

Mastering SSH Tunneling: A Guide to Securing Your Network Traffic

7
Comments
4 min read
End Of Series: SQL Injection Detect & Defend

End Of Series: SQL Injection Detect & Defend

5
Comments 1
1 min read
Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

5
Comments
3 min read
Part 6: SQL Injection Series: Case Studies and Lessons Learned

Part 6: SQL Injection Series: Case Studies and Lessons Learned

6
Comments
4 min read
Part 5: SQL Injection Series: Future Trends and Emerging Challenges

Part 5: SQL Injection Series: Future Trends and Emerging Challenges

5
Comments
4 min read
From Human to Machine

From Human to Machine

Comments
5 min read
The Impact of AI on Creative Industries

The Impact of AI on Creative Industries

9
Comments
6 min read
Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

5
Comments
4 min read
Implications for Encryption and Cybersecurity with Quantum Computing

Implications for Encryption and Cybersecurity with Quantum Computing

Comments
4 min read
Wireless Security Configuration: Protect Your Network Now!

Wireless Security Configuration: Protect Your Network Now!

Comments
3 min read
Creating a Simple a Virus using Python

Creating a Simple a Virus using Python

5
Comments
4 min read
Celebrating 10,000 Followers on DEV.to – A Journey of Learning and Growth[Must Read]

Celebrating 10,000 Followers on DEV.to – A Journey of Learning and Growth[Must Read]

5
Comments
3 min read
How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

How to Detect and Defend Against SQL Injection Attacks - Part 3[Must Read]

5
Comments
4 min read
Top 12 DevSecOps Tools for 2025

Top 12 DevSecOps Tools for 2025

5
Comments
10 min read
The Transformative Role of AI in Ridesharing Security

The Transformative Role of AI in Ridesharing Security

2
Comments
3 min read
How to Detect and Defend Against SQL Injection Attacks(Part-1)[Must Read]

How to Detect and Defend Against SQL Injection Attacks(Part-1)[Must Read]

6
Comments
4 min read
AI Applications Across Industries

AI Applications Across Industries

5
Comments 2
7 min read
Analysis of the Compose Configuration File for SafeLine WAF - MGT

Analysis of the Compose Configuration File for SafeLine WAF - MGT

6
Comments
2 min read
Open Source IDS/IPS Suricata for Beginners

Open Source IDS/IPS Suricata for Beginners

6
Comments
3 min read
loading...