DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Update / Delete Passkeys via WebAuthn Signal API

Update / Delete Passkeys via WebAuthn Signal API

Comments
3 min read
Ensure a robust and secure environment

Ensure a robust and secure environment

Comments
2 min read
Turning Your Server into a High-Security Server with a Free WAF

Turning Your Server into a High-Security Server with a Free WAF

12
Comments
4 min read
The Ultimate Guide to Understanding Blind SQL injection

The Ultimate Guide to Understanding Blind SQL injection

10
Comments
3 min read
10 GCP Security Best Practices for Busy DevOps

10 GCP Security Best Practices for Busy DevOps

Comments
7 min read
Understanding Semantic Analysis Algorithms: A Beginner’s Guide

Understanding Semantic Analysis Algorithms: A Beginner’s Guide

10
Comments
3 min read
Guide to Addressing “Network File Descriptor is Not Connected”

Guide to Addressing “Network File Descriptor is Not Connected”

10
Comments
3 min read
Addressing Container Errors in Containerized Apps

Addressing Container Errors in Containerized Apps

6
Comments
3 min read
How to prevent XSS Attacks in ASP.NET Core Web API

How to prevent XSS Attacks in ASP.NET Core Web API

14
Comments 1
3 min read
SQL INJECTION AND ITS TYPES.

SQL INJECTION AND ITS TYPES.

4
Comments
3 min read
Top 10 Web Application Security Threats

Top 10 Web Application Security Threats

12
Comments
6 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 2)

10
Comments
5 min read
New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

New Supply Chain Attack Technique Can Trojanize All Commands (Part 1)

10
Comments
6 min read
Five Free Security Tools That Will Surprise You

Five Free Security Tools That Will Surprise You

1
Comments
3 min read
Recent 0day Threat Intelligence Alert from Darknet

Recent 0day Threat Intelligence Alert from Darknet

10
Comments
2 min read
4 Steps to Achieving API Governance in Your Organization

4 Steps to Achieving API Governance in Your Organization

Comments
1 min read
Hotel Booking Data Breach of Taiwan Tourists

Hotel Booking Data Breach of Taiwan Tourists

10
Comments
3 min read
POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

POC of Grafana Post-Auth DuckDB SQL Injection (File Read) CVE-2024-9264

14
Comments
3 min read
API Compliance: Introduction and 6 Critical Best Practices

API Compliance: Introduction and 6 Critical Best Practices

Comments
1 min read
OWASP Juice Shop DOM XSS Walkthrough <OWASP-JS Pt.2>

OWASP Juice Shop DOM XSS Walkthrough <OWASP-JS Pt.2>

Comments
3 min read
Getting Started with Ansible: Automation Meets Cybersecurity

Getting Started with Ansible: Automation Meets Cybersecurity

1
Comments
4 min read
Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!

Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!

Comments
3 min read
From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Rejections to Find My Calling

From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Rejections to Find My Calling

Comments
6 min read
Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Comments
2 min read
The Book Nook: A Website Security Crisis

The Book Nook: A Website Security Crisis

13
Comments
3 min read
How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

1
Comments
5 min read
Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

5
Comments
2 min read
Implementing Network Security: A Guide to Modern Methodologies

Implementing Network Security: A Guide to Modern Methodologies

11
Comments 1
5 min read
Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Comments
3 min read
Automated Security Operations with Safeline WAF (Part 2)

Automated Security Operations with Safeline WAF (Part 2)

11
Comments
5 min read
How to Set Up SSL Protocols and Cipher Suites with SafeLine WAF

How to Set Up SSL Protocols and Cipher Suites with SafeLine WAF

5
Comments
2 min read
The Hidden Key: A Tale of Access Control

The Hidden Key: A Tale of Access Control

11
Comments
3 min read
Automated Security Operations with Safeline WAF (Part 1)

Automated Security Operations with Safeline WAF (Part 1)

10
Comments
4 min read
Kong API Gateway x SafeLine, an Open Source WAF

Kong API Gateway x SafeLine, an Open Source WAF

14
Comments
2 min read
Guide to SafeLine Open API: Secure Your Access with API Tokens

Guide to SafeLine Open API: Secure Your Access with API Tokens

5
Comments
2 min read
Configuring the SSL protocol for Open Source SafeLine WAF

Configuring the SSL protocol for Open Source SafeLine WAF

9
Comments
2 min read
Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SARIF, And More…

Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SARIF, And More…

4
Comments
8 min read
Do You Have a Website? Are You Worried About Hackers Attacking It?

Do You Have a Website? Are You Worried About Hackers Attacking It?

6
Comments
3 min read
Deploying Static Files for Website Hosting in SafeLine

Deploying Static Files for Website Hosting in SafeLine

5
Comments
1 min read
Addressing Configuration Issues of SafeLine WAF

Addressing Configuration Issues of SafeLine WAF

17
Comments 1
5 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
The 6 Best Web Application Firewalls Compared (2024)

The 6 Best Web Application Firewalls Compared (2024)

12
Comments
4 min read
How to Secure Static Resources with Open Source WAF, SafeLine

How to Secure Static Resources with Open Source WAF, SafeLine

11
Comments
1 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

12
Comments
3 min read
WEP Encryption: The Theory Behind Network Security

WEP Encryption: The Theory Behind Network Security

1
Comments
4 min read
DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"

DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"

Comments
1 min read
Open API Usage Tutorial for Open Source WAF SafeLine

Open API Usage Tutorial for Open Source WAF SafeLine

12
Comments
2 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
The Significance of Website Hacking

The Significance of Website Hacking

12
Comments
3 min read
How to Set Up a Honeypot for Cyber Attacks

How to Set Up a Honeypot for Cyber Attacks

10
Comments 2
2 min read
Integrating Cybersecurity into Risk Management: A Comprehensive Guide

Integrating Cybersecurity into Risk Management: A Comprehensive Guide

Comments
6 min read
Top 6 Free and Open Source Cybersecurity Tools for Startups

Top 6 Free and Open Source Cybersecurity Tools for Startups

17
Comments
3 min read
Drupal GovCon 2024: Securing The Government's Open-Source Web Applications

Drupal GovCon 2024: Securing The Government's Open-Source Web Applications

Comments
6 min read
Understanding How an Open Source WAF Monitor HTTP Requests

Understanding How an Open Source WAF Monitor HTTP Requests

11
Comments
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine

Demystifying the Technology Architecture of Open Source WAF, SafeLine

12
Comments
3 min read
Black Hat Asia 2025: What You Need to Know

Black Hat Asia 2025: What You Need to Know

11
Comments
2 min read
Building a Password Strength Checker in Python

Building a Password Strength Checker in Python

3
Comments
3 min read
You do not know, what you do not know.

You do not know, what you do not know.

Comments
2 min read
The Beginner’s Guide to Understanding HTTP Protocol

The Beginner’s Guide to Understanding HTTP Protocol

22
Comments 9
3 min read
loading...