DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
WAF Showdown: Real Deployment Costs Compared

WAF Showdown: Real Deployment Costs Compared

5
Comments
2 min read
The Future of Security is Identity: How IAM is Redefining Enterprise Protection

The Future of Security is Identity: How IAM is Redefining Enterprise Protection

Comments
3 min read
Keycloak tm1

Keycloak tm1

Comments
6 min read
The Crucial Intersection of Cybersecurity and Product Management

The Crucial Intersection of Cybersecurity and Product Management

1
Comments
4 min read
Outil de Cybersécurité du Jour - Nov 13, 2025

Outil de Cybersécurité du Jour - Nov 13, 2025

Comments
2 min read
How a WooCommerce Store Survived Real-World Attacks with SafeLine WAF

How a WooCommerce Store Survived Real-World Attacks with SafeLine WAF

5
Comments
3 min read
Understanding Business Logic Attacks in SaaS and How to Prevent Them

Understanding Business Logic Attacks in SaaS and How to Prevent Them

Comments
4 min read
SafeLine WAF: A Quick Nginx Setup That Secures WordPress in 30 Minutes

SafeLine WAF: A Quick Nginx Setup That Secures WordPress in 30 Minutes

Comments
2 min read
The Free WAF Everyone’s Grabbing: 1ms Protection, Zero Rules, and a 30-Minute Learning Curve

The Free WAF Everyone’s Grabbing: 1ms Protection, Zero Rules, and a 30-Minute Learning Curve

Comments
3 min read
Upgraded My Homelab Web Security with SafeLine WAF

Upgraded My Homelab Web Security with SafeLine WAF

Comments
1 min read
🧠 How User-Space and Kernel-Space Affect Security in Linux

🧠 How User-Space and Kernel-Space Affect Security in Linux

Comments
3 min read
🛡️ Advanced Web Data Collection: Building PhantomCollect for Security Research

🛡️ Advanced Web Data Collection: Building PhantomCollect for Security Research

Comments
3 min read
SafeLine WAF Builds a Unified Identity Authentication Hub

SafeLine WAF Builds a Unified Identity Authentication Hub

Comments
2 min read
Designing Fraud-Resistant Fintech Apps: Android Architecture That Actually Works (2025)

Designing Fraud-Resistant Fintech Apps: Android Architecture That Actually Works (2025)

Comments
1 min read
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Comments
1 min read
My First Step Into Cybersecurity

My First Step Into Cybersecurity

Comments
1 min read
🔐 Exploring Wi‑Fi Security Safely: A Beginner‑Friendly Guide to the WiFi‑Lab Controller (with GUI!)

🔐 Exploring Wi‑Fi Security Safely: A Beginner‑Friendly Guide to the WiFi‑Lab Controller (with GUI!)

5
Comments 1
4 min read
A Self-Hosted Alternative to Cloudflare

A Self-Hosted Alternative to Cloudflare

6
Comments
3 min read
Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats

Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats

Comments
3 min read
📚 An In-Depth Guide to Modern Cryptography and Web Security

📚 An In-Depth Guide to Modern Cryptography and Web Security

Comments
5 min read
Non-functional Application Requirements: Compliance

Non-functional Application Requirements: Compliance

1
Comments
13 min read
Weekend Project- Building a Serverless Phishing Detector for Google's Cloud Run Hackathon

Weekend Project- Building a Serverless Phishing Detector for Google's Cloud Run Hackathon

Comments
3 min read
Feistel Cipher: The Architectural Marvel Behind Modern Cryptography

Feistel Cipher: The Architectural Marvel Behind Modern Cryptography

Comments
1 min read
Is the Public Cloud Ready for Post-Quantum Cryptography?

Is the Public Cloud Ready for Post-Quantum Cryptography?

3
Comments 1
9 min read
Best Beginner’s Guide For Cybersecurity Recon with Python

Best Beginner’s Guide For Cybersecurity Recon with Python

5
Comments
8 min read
loading...