DEV Community

# websecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
Authentication and Authorization Techniques in Modern Web Applications

Authentication and Authorization Techniques in Modern Web Applications

1
Comments
4 min read
OAuth and OpenID Connect: Protecting User Authentication Properly

OAuth and OpenID Connect: Protecting User Authentication Properly

Comments
4 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Common Web Vulnerabilities: How to Prevent and Mitigate Attacks

Comments
5 min read
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks

Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks

1
Comments
4 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

11
Comments
3 min read
The Significance of Website Hacking

The Significance of Website Hacking

15
Comments
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests

Understanding How an Open Source WAF Monitor HTTP Requests

11
Comments
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine

Demystifying the Technology Architecture of Open Source WAF, SafeLine

12
Comments
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)

Deploying High Availability SafeLine WAF on K3s(Part 4)

17
Comments
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF

How to Prevent Brute Force Attacks with SafeLine WAF

14
Comments
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

18
Comments
3 min read
The Ultimate Guide to Understanding Web Application Authentication

The Ultimate Guide to Understanding Web Application Authentication

16
Comments
3 min read
The Beginner's Guide to Install and Deploy SafeLine WAF

The Beginner's Guide to Install and Deploy SafeLine WAF

6
Comments
3 min read
Open Source Tool List for Web App Security

Open Source Tool List for Web App Security

2
Comments
4 min read
How to Secure PHP Applications from SQL Injection Attacks

How to Secure PHP Applications from SQL Injection Attacks

Comments
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Comments
2 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Essential Security Practices for Web Developers: Keep Your Code Safe and Sound

Comments
3 min read
Load Balancing with Reverse Proxy

Load Balancing with Reverse Proxy

2
Comments
3 min read
Addressing Arbitrary Input with SafeLine

Addressing Arbitrary Input with SafeLine

1
Comments 1
3 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

6
Comments
2 min read
Five Free WAF Performance Comparison

Five Free WAF Performance Comparison

2
Comments
4 min read
How to Secure OpenResty with a Free WAF

How to Secure OpenResty with a Free WAF

5
Comments
3 min read
5 Best Free and Open Source WAF for 2025

5 Best Free and Open Source WAF for 2025

3
Comments
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐

🌐 SSL Certificates and How to Implement Them in Your Website 🔐

1
Comments 1
3 min read
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js

Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js

Comments
5 min read
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js

Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js

1
Comments
7 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!

Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!

14
Comments
2 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack

Protect JWT Token from Token Forgery and Data Manipulation Attack

1
Comments
3 min read
Preventing Weak Cryptography in JavaScript

Preventing Weak Cryptography in JavaScript

Comments
3 min read
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications

Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications

Comments
2 min read
Protecting Your JavaScript Applications from DOM-based XSS Attacks

Protecting Your JavaScript Applications from DOM-based XSS Attacks

Comments
3 min read
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications

2
Comments
4 min read
Steps to Preventing Prototype Pollution Attacks in JavaScript

Steps to Preventing Prototype Pollution Attacks in JavaScript

1
Comments
3 min read
Preventing Supply Chain Attacks in JavaScript

Preventing Supply Chain Attacks in JavaScript

Comments
2 min read
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript

Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript

3
Comments
3 min read
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide

Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide

Comments
3 min read
Securing Your API Keys in Frontend Projects

Securing Your API Keys in Frontend Projects

2
Comments
2 min read
Preventing Clickjacking Attacks in JavaScript

Preventing Clickjacking Attacks in JavaScript

53
Comments 6
3 min read
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks

Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks

1
Comments
3 min read
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

2
Comments 1
3 min read
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide

Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide

4
Comments
4 min read
GCP Cloud Armor - How to Leverage and add extra layer of security

GCP Cloud Armor - How to Leverage and add extra layer of security

2
Comments
2 min read
HTTPS là gÏ mà web nào cŊng xài (Phần 1)

HTTPS là gÏ mà web nào cŊng xài (Phần 1)

1
Comments
6 min read
Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

2
Comments
3 min read
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication

Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication

5
Comments
3 min read
Enhancing Security in React with External Script Loading

Enhancing Security in React with External Script Loading

1
Comments
2 min read
Navigating the Risks of Third-Party Libraries in Web

Navigating the Risks of Third-Party Libraries in Web

Comments
4 min read
Best Security Practices for Web Browsing

Best Security Practices for Web Browsing

Comments
3 min read
Story of SSRF from Stored XSS in PDF generator application

Story of SSRF from Stored XSS in PDF generator application

3
Comments 3
3 min read
OWASP Top 10 - Write-up - TryHackMe

OWASP Top 10 - Write-up - TryHackMe

13
Comments
7 min read
Common Web Security Attacks and Top Tips to Protect Your Website

Common Web Security Attacks and Top Tips to Protect Your Website

9
Comments
2 min read
Web Security

Web Security

1
Comments
7 min read
Top websites for website vulnerability checks online

Top websites for website vulnerability checks online

3
Comments
2 min read
Web Security: Recon

Web Security: Recon

2
Comments 1
7 min read
Web Security: Introduction

Web Security: Introduction

12
Comments
3 min read
Javascript flaws you should know

Javascript flaws you should know

5
Comments
2 min read
10 tips to build a Content Security Policy (CSP) without breaking your site!

10 tips to build a Content Security Policy (CSP) without breaking your site!

18
Comments
10 min read
What is Cybersecurity?

What is Cybersecurity?

2
Comments
1 min read
loading...