DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

200 reports, 11 valid bugs, 0 critical issues. Why our HackerOne VDP was still worth it

Comments
3 min read
SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

SafeLine: The Open-Source WAF That Actually Protects Your Web Apps

Comments
4 min read
Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Why Identity Threat Detection & Response (ITDR) Is Becoming Essential in Modern Security

Comments
3 min read
SOAL UJIAN TENGAH SEMESTER (UTS) : KEAMANAN APLIKASI WEB LARAVEL

SOAL UJIAN TENGAH SEMESTER (UTS) : KEAMANAN APLIKASI WEB LARAVEL

1
Comments
2 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
IoT Security in the 5G Era: How Connected Devices Became the New Attack Surface

IoT Security in the 5G Era: How Connected Devices Became the New Attack Surface

5
Comments
7 min read
Cybersecurity Fatigue Isn’t a Bug — It’s a Systemic Failure in MSP Engineering

Cybersecurity Fatigue Isn’t a Bug — It’s a Systemic Failure in MSP Engineering

Comments
3 min read
Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

Cybersecurity Weekly #8: Securing Remote Collaboration for Freelancers & Virtual Teams in 2025

1
Comments
3 min read
WAF Showdown: Real Deployment Costs Compared

WAF Showdown: Real Deployment Costs Compared

5
Comments
2 min read
The Future of Security is Identity: How IAM is Redefining Enterprise Protection

The Future of Security is Identity: How IAM is Redefining Enterprise Protection

Comments
3 min read
Keycloak tm1

Keycloak tm1

Comments
6 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Outil de Cybersécurité du Jour - Nov 13, 2025

Outil de Cybersécurité du Jour - Nov 13, 2025

Comments
2 min read
How a WooCommerce Store Survived Real-World Attacks with SafeLine WAF

How a WooCommerce Store Survived Real-World Attacks with SafeLine WAF

5
Comments
3 min read
Understanding Business Logic Attacks in SaaS and How to Prevent Them

Understanding Business Logic Attacks in SaaS and How to Prevent Them

Comments
4 min read
SafeLine WAF: A Quick Nginx Setup That Secures WordPress in 30 Minutes

SafeLine WAF: A Quick Nginx Setup That Secures WordPress in 30 Minutes

Comments
2 min read
The Free WAF Everyone’s Grabbing: 1ms Protection, Zero Rules, and a 30-Minute Learning Curve

The Free WAF Everyone’s Grabbing: 1ms Protection, Zero Rules, and a 30-Minute Learning Curve

Comments
3 min read
Upgraded My Homelab Web Security with SafeLine WAF

Upgraded My Homelab Web Security with SafeLine WAF

Comments
1 min read
🧠 How User-Space and Kernel-Space Affect Security in Linux

🧠 How User-Space and Kernel-Space Affect Security in Linux

Comments
3 min read
🛡️ Advanced Web Data Collection: Building PhantomCollect for Security Research

🛡️ Advanced Web Data Collection: Building PhantomCollect for Security Research

Comments
3 min read
Is AI Really Dangerous or Is It a Myth? Separating Facts from Fear

Is AI Really Dangerous or Is It a Myth? Separating Facts from Fear

5
Comments
6 min read
SafeLine WAF Builds a Unified Identity Authentication Hub

SafeLine WAF Builds a Unified Identity Authentication Hub

Comments
2 min read
Designing Fraud-Resistant Fintech Apps: Android Architecture That Actually Works (2025)

Designing Fraud-Resistant Fintech Apps: Android Architecture That Actually Works (2025)

Comments
1 min read
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Comments
1 min read
My First Step Into Cybersecurity

My First Step Into Cybersecurity

Comments
1 min read
loading...