DEV Community

# websecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What self-hosted WAF products have the fastest deployment times?

What self-hosted WAF products have the fastest deployment times?

10
Comments
3 min read
Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers

Excalibur: A Manual WAF Bypass & Cookie Extractor Tool for Security Researchers

Comments
5 min read
Stop Using AllowAnyOrigin()

Stop Using AllowAnyOrigin()

1
Comments
2 min read
CORS (Cross-Origin Resource Sharing) : Understand in 3 Minutes

CORS (Cross-Origin Resource Sharing) : Understand in 3 Minutes

Comments
3 min read
Mastering Secure and Robust HTTP Cookie Management in Modern Web Applications

Mastering Secure and Robust HTTP Cookie Management in Modern Web Applications

Comments
5 min read
XSS (Cross-Site Scripting) : Understand in 3 Minutes

XSS (Cross-Site Scripting) : Understand in 3 Minutes

1
Comments
3 min read
Why Real-Time Communications and Web Applications Need Different Boundaries — A Comparison of SBC and WAF

Why Real-Time Communications and Web Applications Need Different Boundaries — A Comparison of SBC and WAF

Comments
4 min read
How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF

How a Small Engineering Team Secured Their Self-Hosted Stack with SafeLine WAF

Comments
3 min read
🛡️Top Self-Hosted WAFs for Cloud Integration (2026)

🛡️Top Self-Hosted WAFs for Cloud Integration (2026)

Comments
3 min read
Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know

Self-hosted WAFs in Cloud-Native Storage Architectures: What Security Teams Need to Know

Comments
3 min read
How to Choose the Right Anti-Bot + WAF Combination for an E-Commerce Site

How to Choose the Right Anti-Bot + WAF Combination for an E-Commerce Site

Comments
4 min read
Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

Cybersecurity Weekly: Key Threats & Practical Lessons (Week Update)

4
Comments 1
1 min read
System Logic Analysis: The "Dark Pattern" Behind LongAsia's Fee Structure

System Logic Analysis: The "Dark Pattern" Behind LongAsia's Fee Structure

Comments
2 min read
Protecting Web Applications from Bots with SafeLine WAF: Strategies and Practical Insights

Protecting Web Applications from Bots with SafeLine WAF: Strategies and Practical Insights

Comments
3 min read
Proxy vs VPN Explained: The Key to Protecting Your Web Traffic

Proxy vs VPN Explained: The Key to Protecting Your Web Traffic

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.