DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ModSecurity + SafeLine WAF for Multi-layer Defense (2)

ModSecurity + SafeLine WAF for Multi-layer Defense (2)

6
Comments
3 min read
ModSecurity + SafeLine WAF for Multi-layer Defense (1)

ModSecurity + SafeLine WAF for Multi-layer Defense (1)

6
Comments
6 min read
Jenkins File Read Vulnerability - CVE-2024-23897

Jenkins File Read Vulnerability - CVE-2024-23897

2
Comments
2 min read
Top 5 Cybersecurity Certifications to Boost Your Career

Top 5 Cybersecurity Certifications to Boost Your Career

5
Comments
2 min read
Setting Up SafeLine: Best Practices for Secure Web Traffic

Setting Up SafeLine: Best Practices for Secure Web Traffic

9
Comments
3 min read
Transform Your Server into a High-Security Fortress with SafeLine WAF

Transform Your Server into a High-Security Fortress with SafeLine WAF

5
Comments
2 min read
Practical Example of Escaping XSS Context

Practical Example of Escaping XSS Context

2
Comments 2
4 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Comments
3 min read
How Semantic Analysis Works in SafeLine WAF

How Semantic Analysis Works in SafeLine WAF

9
Comments
2 min read
What is a Web Application Gateway

What is a Web Application Gateway

6
Comments
2 min read
Top 10 Web Application Gateways 2025

Top 10 Web Application Gateways 2025

4
Comments
3 min read
A Comprehensive Guide to Understand Penetration Testing

A Comprehensive Guide to Understand Penetration Testing

3
Comments
4 min read
How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)

How I Hacked Large Language Models(LLMs) Using Prompt Injection (And It Worked)

2
Comments
5 min read
What are OSI Model and HTTP Request for Beginners

What are OSI Model and HTTP Request for Beginners

12
Comments 4
5 min read
Securing Microservices on AWS: Cybersecurity Considerations

Securing Microservices on AWS: Cybersecurity Considerations

Comments
13 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Beginners' Guide to Understand Web Crawlers and Bots (2)

Beginners' Guide to Understand Web Crawlers and Bots (2)

2
Comments
3 min read
Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Navigating the Digital Frontier: A Cybersecurity Primer for Business Owners

Comments
2 min read
Where Should I Start with Cybersecurity

Where Should I Start with Cybersecurity

3
Comments
5 min read
Load Balancing with Reverse Proxy

Load Balancing with Reverse Proxy

2
Comments
3 min read
A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

A Beginner's Guide to Packet Sniffing Using Wireshark(Must Read)

11
Comments
3 min read
Demystifying XDR for MSPs: A Practical Guide

Demystifying XDR for MSPs: A Practical Guide

Comments
4 min read
Polyfills - a filler or a gaping hole? (Part-2)

Polyfills - a filler or a gaping hole? (Part-2)

Comments
5 min read
TCP/IP Networking Model

TCP/IP Networking Model

2
Comments 1
5 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)

10 Under-the-Radar Cybersecurity Threats SMBs Face in 2024 (And How to Defend Against Them)

Comments
2 min read
List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

List of the best Google Dorks in 2024 for finding SQL injection vulnerabilities and other security issues:

12
Comments
1 min read
SafeLine WAF: Network Traffic Scrubbing

SafeLine WAF: Network Traffic Scrubbing

6
Comments
3 min read
Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

Kali Linux for Ethical Hacking: The Ultimate Toolkit for Cybersecurity Professionals

1
Comments
4 min read
SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

SQLMap Cheat Sheet: A Quick Guide for Automated SQL Injection

7
Comments
3 min read
Artificial General Intelligence: The Future of AI for Developers

Artificial General Intelligence: The Future of AI for Developers

3
Comments
2 min read
Is it possible to eliminate phishing?

Is it possible to eliminate phishing?

Comments
1 min read
Building a Botnet Simulation: Because Learning About Cybersecurity Shouldn’t Be Boring

Building a Botnet Simulation: Because Learning About Cybersecurity Shouldn’t Be Boring

Comments
5 min read
A Reliable Anti-Scraping Tool: My Experience with SafeLine

A Reliable Anti-Scraping Tool: My Experience with SafeLine

8
Comments 2
2 min read
How do I save my website from getting hacked?

How do I save my website from getting hacked?

2
Comments
3 min read
How Does WAF Prevent OS Command Injection Attacks

How Does WAF Prevent OS Command Injection Attacks

2
Comments
5 min read
Unlock New Capabilities with SafeLine 6.7.0

Unlock New Capabilities with SafeLine 6.7.0

7
Comments
2 min read
How Does WAF Prevent SQL Injection

How Does WAF Prevent SQL Injection

2
Comments
5 min read
How Does WAF Prevent XSS Attacks

How Does WAF Prevent XSS Attacks

2
Comments
5 min read
The Power of Reconnaissance in Cyber Security: Why You Should Prioritize Recon

The Power of Reconnaissance in Cyber Security: Why You Should Prioritize Recon

Comments
1 min read
Every Cyber Attack and how to prevent from them

Every Cyber Attack and how to prevent from them

6
Comments
5 min read
How to Deploy SafeLine WAF on Ubuntu

How to Deploy SafeLine WAF on Ubuntu

6
Comments
2 min read
Addressing Arbitrary Input with SafeLine

Addressing Arbitrary Input with SafeLine

1
Comments 1
3 min read
Web Application Firewall

Web Application Firewall

10
Comments
4 min read
Top 5 Website Data Leakage Events 2024

Top 5 Website Data Leakage Events 2024

2
Comments
2 min read
Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
Hi, I'm Dan!

Hi, I'm Dan!

1
Comments
1 min read
SafeLine WAF: How to Protect Your Website Dynamically

SafeLine WAF: How to Protect Your Website Dynamically

16
Comments
3 min read
What is Dynamic Protection in SafeLine WAF

What is Dynamic Protection in SafeLine WAF

5
Comments
2 min read
Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

6
Comments
2 min read
5 Use Cases for Using Open Policy Agent

5 Use Cases for Using Open Policy Agent

Comments
7 min read
AI against Daunting Security: The Future of Self-Rule Hacking

AI against Daunting Security: The Future of Self-Rule Hacking

5
Comments
1 min read
What is a subnet? | How subnetting works

What is a subnet? | How subnetting works

4
Comments
7 min read
Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

1
Comments
15 min read
How to Run Open Source WAF SafeLine on K8s

How to Run Open Source WAF SafeLine on K8s

9
Comments
4 min read
Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

10
Comments
4 min read
Why You Need to Protect Your Website and How

Why You Need to Protect Your Website and How

6
Comments
3 min read
Discover What's New in SafeLine 6.8.0

Discover What's New in SafeLine 6.8.0

5
Comments
1 min read
Why is HTTP not secure? | HTTP vs. HTTPS

Why is HTTP not secure? | HTTP vs. HTTPS

5
Comments
3 min read
Mastering Code: Why Programming is Indispensable in Cybersecurity

Mastering Code: Why Programming is Indispensable in Cybersecurity

1
Comments 1
1 min read
loading...