Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Transformation numérique, quel impact sur la sécurité des entreprises ?
Cover image for Transformation numérique, quel impact sur la sécurité des entreprises ?

Transformation numérique, quel impact sur la sécurité des entreprises ?

7
Comments
12 min read
Annoyed by AI Bots? A WAF Solution You've Never Seen

Annoyed by AI Bots? A WAF Solution You've Never Seen

6
Comments
4 min read
What each container does in SafeLine WAF

What each container does in SafeLine WAF

10
Comments
3 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities
Cover image for Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

13
Comments 2
4 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm

11
Comments
4 min read
What Are Web Application Security Detection Rules?

What Are Web Application Security Detection Rules?

7
Comments
3 min read
Building Secure APIs: Best Practices for Data Protection
Cover image for Building Secure APIs: Best Practices for Data Protection

Building Secure APIs: Best Practices for Data Protection

1
Comments
4 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive
Cover image for Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

10
Comments
5 min read
⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure
Cover image for ⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

1
Comments
3 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques
Cover image for Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

11
Comments
5 min read
How to Select a WAF for New Webmasters(Part 1)

How to Select a WAF for New Webmasters(Part 1)

7
Comments
4 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace
Cover image for Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!
Cover image for Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!

Recent Web Vulnerabilities and How LLMs and DCS Can Help Combat Them!

1
Comments
2 min read
Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example
Cover image for Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

2
Comments
3 min read
Phishing And Malware - A Practical Dive
Cover image for Phishing And Malware - A Practical Dive

Phishing And Malware - A Practical Dive

5
Comments
3 min read
How to detect wildcard security vulnerabilities
Cover image for How to detect wildcard security vulnerabilities

How to detect wildcard security vulnerabilities

1
Comments
3 min read
End Of Series: SQL Injection Detect & Defend

End Of Series: SQL Injection Detect & Defend

5
Comments 1
1 min read
DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation
Cover image for DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

Comments
6 min read
Mastering SSH Tunneling: A Guide to Securing Your Network Traffic
Cover image for Mastering SSH Tunneling: A Guide to Securing Your Network Traffic

Mastering SSH Tunneling: A Guide to Securing Your Network Traffic

8
Comments
4 min read
How to Prevent SQL Injection with SafeLine WAF

How to Prevent SQL Injection with SafeLine WAF

8
Comments
2 min read
Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

5
Comments
3 min read
Part 5: SQL Injection Series: Future Trends and Emerging Challenges

Part 5: SQL Injection Series: Future Trends and Emerging Challenges

5
Comments
4 min read
Part 6: SQL Injection Series: Case Studies and Lessons Learned

Part 6: SQL Injection Series: Case Studies and Lessons Learned

9
Comments
4 min read
Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

6
Comments
2 min read
The Impact of AI on Creative Industries
Cover image for The Impact of AI on Creative Industries

The Impact of AI on Creative Industries

10
Comments
6 min read
loading...