DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

8
Comments
2 min read
How AI in CRM enhances Customer Engagement?

How AI in CRM enhances Customer Engagement?

1
Comments
9 min read
Passkey One-Tap Login: The Most Efficient Login

Passkey One-Tap Login: The Most Efficient Login

Comments
2 min read
Social Engineering Attack

Social Engineering Attack

Comments
1 min read
Achieving Multi-WAF Protection and Failover Using SafeLine WAF

Achieving Multi-WAF Protection and Failover Using SafeLine WAF

6
Comments
3 min read
Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Comments
1 min read
Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

2
Comments
4 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Comments
2 min read
FiveM RAT Analysis

FiveM RAT Analysis

Comments
2 min read
How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

5
Comments 1
2 min read
SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

10
Comments
3 min read
11.5K Stars! This Web Application Firewall Tool is Incredible!

11.5K Stars! This Web Application Firewall Tool is Incredible!

9
Comments
2 min read
Only 2 papers & 3 assessments to go.

Only 2 papers & 3 assessments to go.

Comments
2 min read
Simple, Easy-to-Use, and Open-Source Web Application Firewall

Simple, Easy-to-Use, and Open-Source Web Application Firewall

7
Comments
2 min read
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
Exploring WAFs: How SafeLine Defends Against Web Attacks

Exploring WAFs: How SafeLine Defends Against Web Attacks

6
Comments
3 min read
How to use PwnFox with Burp Suite

How to use PwnFox with Burp Suite

4
Comments
3 min read
Why Cyber Security Testing is Essential for Compliance and Regulation

Why Cyber Security Testing is Essential for Compliance and Regulation

3
Comments 1
5 min read
User Presence & Verification in WebAuthn: Detailed Guide

User Presence & Verification in WebAuthn: Detailed Guide

Comments
3 min read
Boost Your Website Security with This Free, Open-Source WAF: Safeline

Boost Your Website Security with This Free, Open-Source WAF: Safeline

8
Comments
3 min read
Cyber Security for Business: Essential Best Practices and Services to Protect Against Cyber Attacks in India

Cyber Security for Business: Essential Best Practices and Services to Protect Against Cyber Attacks in India

Comments
3 min read
DEF CON 32: What We Learned About Secrets Security at AppSec Village

DEF CON 32: What We Learned About Secrets Security at AppSec Village

8
Comments 1
9 min read
The Intersection of Cybersecurity and Artificial Intelligence: A New Frontier

The Intersection of Cybersecurity and Artificial Intelligence: A New Frontier

1
Comments
4 min read
Visa Passkeys: Payment Service that is Secure & Convenient

Visa Passkeys: Payment Service that is Secure & Convenient

1
Comments
3 min read
Secure Coding Principles

Secure Coding Principles

12
Comments
29 min read
Ethical Hacking - This article is about discovering vulnerabilities in web applications.

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

6
Comments
11 min read
A New Milestone in Code Security: SafeLine WAF

A New Milestone in Code Security: SafeLine WAF

8
Comments
2 min read
How To Integrate Passkeys into Svelte

How To Integrate Passkeys into Svelte

Comments
4 min read
SafeLine: The Open-Source WAF with Powerful Security and Easy Deployment

SafeLine: The Open-Source WAF with Powerful Security and Easy Deployment

8
Comments
2 min read
The Edge of Impossible: Exploring New Frontiers in Cybersecurity

The Edge of Impossible: Exploring New Frontiers in Cybersecurity

5
Comments
1 min read
Web Application Penetration Testing: An In-Depth Guide

Web Application Penetration Testing: An In-Depth Guide

Comments
2 min read
Segregation SSH Traffic

Segregation SSH Traffic

Comments
4 min read
Understanding Networks: From Basics to Advanced Concepts.

Understanding Networks: From Basics to Advanced Concepts.

1
Comments
6 min read
My Day-1 in kalvium simulation work

My Day-1 in kalvium simulation work

6
Comments
2 min read
How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

18
Comments
3 min read
Let's Make the Internet a Safer Place! State of Passkeys is Now Live on Product Hunt 🚀

Let's Make the Internet a Safer Place! State of Passkeys is Now Live on Product Hunt 🚀

1
Comments 2
2 min read
El Canario Digital: Descifrando los Silencios de Telegram

El Canario Digital: Descifrando los Silencios de Telegram

Comments
3 min read
Understanding IP Address Types, Subnets, and Loopback

Understanding IP Address Types, Subnets, and Loopback

2
Comments
2 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

2
Comments
4 min read
How to Configure HTTPS and DDoS Protection with SafeLine WAF

How to Configure HTTPS and DDoS Protection with SafeLine WAF

7
Comments
4 min read
Types of DNS attacks

Types of DNS attacks

2
Comments
8 min read
DIY Deployment of SafeLine WAF on K8s

DIY Deployment of SafeLine WAF on K8s

7
Comments
3 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
How to Harden IaC Security with KICS

How to Harden IaC Security with KICS

Comments
6 min read
Top Cybersecurity Practices for 2024: Essential Strategies to Protect Your Digital Assets

Top Cybersecurity Practices for 2024: Essential Strategies to Protect Your Digital Assets

9
Comments 4
3 min read
A Free, Beginner-Friendly Web Protection Tool: SafeLine

A Free, Beginner-Friendly Web Protection Tool: SafeLine

6
Comments
2 min read
SafeLine WAF: Free, Powerful Web Security in a Few Clicks

SafeLine WAF: Free, Powerful Web Security in a Few Clicks

6
Comments
2 min read
Building a Cybersecurity Assistant using Lyzr SDK

Building a Cybersecurity Assistant using Lyzr SDK

Comments
3 min read
30 Day SOC Challenge - Day 1 : Logical Diagram

30 Day SOC Challenge - Day 1 : Logical Diagram

Comments 1
1 min read
Boost Your Website Security in 3 Minutes with SafeLine, the Open-Source WAF with 11.8K GitHub Stars

Boost Your Website Security in 3 Minutes with SafeLine, the Open-Source WAF with 11.8K GitHub Stars

6
Comments
2 min read
Looking for full-stack dev specializing to help build my XDR cybersecurity platform

Looking for full-stack dev specializing to help build my XDR cybersecurity platform

Comments
1 min read
Kriptografi

Kriptografi

Comments
3 min read
Understanding the CIA Triad: The Core Concepts of Cybersecurity

Understanding the CIA Triad: The Core Concepts of Cybersecurity

6
Comments 1
2 min read
Basic Cybersecurity Practices: How to Protect Your Digital Environment

Basic Cybersecurity Practices: How to Protect Your Digital Environment

5
Comments 1
2 min read
Why is Cybersecurity Important? Key Reasons to Protect Your Digital Life

Why is Cybersecurity Important? Key Reasons to Protect Your Digital Life

5
Comments 1
2 min read
Tutorial: How to Integrate Passkeys into Nuxt.js

Tutorial: How to Integrate Passkeys into Nuxt.js

1
Comments
3 min read
SafeLine: The No.1 Free and Open-Source Next-Gen Intelligent WAF

SafeLine: The No.1 Free and Open-Source Next-Gen Intelligent WAF

12
Comments
4 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Comments
4 min read
Secure Your Website with SafeLine: A Free and Easy-to-Use WAF

Secure Your Website with SafeLine: A Free and Easy-to-Use WAF

11
Comments 2
2 min read
loading...