Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
websecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
What self-hosted WAF products have the fastest deployment times?
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 21
What self-hosted WAF products have the fastest deployment times?
#
cybersecurity
#
waf
#
safeline
#
websecurity
10
 reactions
Comments
Add Comment
3 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
Teycir Ben Soltane
Teycir Ben Soltane
Teycir Ben Soltane
Follow
Feb 4
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers
#
security
#
bugbounty
#
websecurity
#
waf
Comments
Add Comment
5 min read
Stop Using AllowAnyOrigin()
Shreyans Padmani
Shreyans Padmani
Shreyans Padmani
Follow
Feb 8
Stop Using AllowAnyOrigin()
#
websecurity
#
dotnet
#
aspnetcore
#
softwaredevelopment
1
 reaction
Comments
Add Comment
2 min read
CORS (Cross-Origin Resource Sharing) : Understand in 3 Minutes
Hongster
Hongster
Hongster
Follow
Jan 30
CORS (Cross-Origin Resource Sharing) : Understand in 3 Minutes
#
cors
#
crossoriginresourcesharing
#
websecurity
#
abotwrotethis
Comments
Add Comment
3 min read
Mastering Secure and Robust HTTP Cookie Management in Modern Web Applications
Life is Good
Life is Good
Life is Good
Follow
Jan 29
Mastering Secure and Robust HTTP Cookie Management in Modern Web Applications
#
websecurity
#
javascript
#
node
#
cookies
Comments
Add Comment
5 min read
XSS (Cross-Site Scripting) : Understand in 3 Minutes
Hongster
Hongster
Hongster
Follow
Jan 20
XSS (Cross-Site Scripting) : Understand in 3 Minutes
#
crosssitescripting
#
websecurity
#
vulnerabilityprevention
#
abotwrotethis
1
 reaction
Comments
Add Comment
3 min read
Why Real-Time Communications and Web Applications Need Different Boundaries — A Comparison of SBC and WAF
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 29
Why Real-Time Communications and Web Applications Need Different Boundaries — A Comparison of SBC and WAF
#
cybersecurity
#
websecurity
#
waf
#
safeline
Comments
Add Comment
4 min read
How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 16
How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF
#
cybersecurity
#
websecurity
#
waf
#
safeline
Comments
Add Comment
3 min read
🛡️Top Self-Hosted WAFs for Cloud Integration (2026)
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 22
🛡️Top Self-Hosted WAFs for Cloud Integration (2026)
#
cybersecurity
#
websecurity
#
waf
#
safeline
Comments
Add Comment
3 min read
Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 23
Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know
#
websecurity
#
cybersecurity
#
waf
#
safeline
Comments
Add Comment
3 min read
How to Choose the Right Anti-Bot + WAF Combination for an E-Commerce Site
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 27
How to Choose the Right Anti-Bot + WAF Combination for an E-Commerce Site
#
cybersecurity
#
websecurity
#
waf
#
safeline
Comments
Add Comment
4 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
Cyber Safety Zone
Cyber Safety Zone
Cyber Safety Zone
Follow
Jan 23
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)
#
cybersecurity
#
websecurity
#
freelancers
#
infosec
4
 reactions
Comments
1
 comment
1 min read
System Logic Analysis: The "Dark Pattern" Behind LongAsia's Fee Structure
AequiAssets
AequiAssets
AequiAssets
Follow
Feb 1
System Logic Analysis: The "Dark Pattern" Behind LongAsia's Fee Structure
#
darkpatterns
#
longasia
#
systemdesign
#
websecurity
Comments
Add Comment
2 min read
Protecting Web Applications from Bots with SafeLine WAF: Strategies and Practical Insights
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 27
Protecting Web Applications from Bots with SafeLine WAF: Strategies and Practical Insights
#
cybersecurity
#
websecurity
#
waf
#
safeline
Comments
Add Comment
3 min read
Proxy vs VPN Explained: The Key to Protecting Your Web Traffic
Arina Cholee
Arina Cholee
Arina Cholee
Follow
Jan 19
Proxy vs VPN Explained: The Key to Protecting Your Web Traffic
#
cybersecurity
#
websecurity
#
waf
#
safeline
Comments
Add Comment
3 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account