Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
Forem
Close
#
websecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Best Practices for Secure File Uploads in PHP: Preventing Common Vulnerabilities
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 26 '24
Best Practices for Secure File Uploads in PHP: Preventing Common Vulnerabilities
#
php
#
fileuploads
#
websecurity
#
phpdevelopment
Comments
Add Comment
4 min read
Common PHP Security Issues and How to Prevent Them
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 26 '24
Common PHP Security Issues and How to Prevent Them
#
php
#
websecurity
#
phpdevelopment
#
securitybestpractices
Comments
Add Comment
5 min read
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒
Hexadecimal
Hexadecimal
Hexadecimal
Follow
Nov 28 '24
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒
#
dnscaching
#
networksecurity
#
dataprivacy
#
websecurity
Comments
Add Comment
4 min read
How PHP Session Management Works and How to Handle Session Security
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 26 '24
How PHP Session Management Works and How to Handle Session Security
#
php
#
sessionmanagement
#
websecurity
#
phpdevelopment
2
reactions
Comments
Add Comment
5 min read
Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 18 '24
Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript
#
javascript
#
websecurity
#
programming
#
webdev
1
reaction
Comments
Add Comment
4 min read
Comprehensive Guide to Cookies in JavaScript
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 17 '24
Comprehensive Guide to Cookies in JavaScript
#
javascript
#
cookies
#
webstorage
#
websecurity
Comments
Add Comment
3 min read
How to Select a WAF for New Webmasters(Part 1)
Carrie
Carrie
Carrie
Follow
Dec 3 '24
How to Select a WAF for New Webmasters(Part 1)
#
webdev
#
cybersecurity
#
websecurity
#
opensource
9
reactions
Comments
Add Comment
4 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm
Carrie
Carrie
Carrie
Follow
Oct 31 '24
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm
#
cybersecurity
#
machinelearning
#
ai
#
websecurity
11
reactions
Comments
Add Comment
4 min read
Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy
Dimcoder
Dimcoder
Dimcoder
Follow
Nov 19 '24
Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy
#
cookies
#
websecurity
#
sessionmanagement
6
reactions
Comments
Add Comment
5 min read
SSRF Attacks: The Silent Threat Hiding in Your Server
Golam_Mostafa
Golam_Mostafa
Golam_Mostafa
Follow
Nov 16 '24
SSRF Attacks: The Silent Threat Hiding in Your Server
#
security
#
websecurity
#
webdev
1
reaction
Comments
Add Comment
1 min read
OAuth and OpenID Connect: Protecting User Authentication Properly
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 11 '24
OAuth and OpenID Connect: Protecting User Authentication Properly
#
websecurity
#
cybersecurity
#
webdev
#
dataprotection
Comments
Add Comment
4 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 9 '24
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks
#
cybersecurity
#
websecurity
#
webdev
#
xss
Comments
Add Comment
5 min read
Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks
Mohit Goyal
Mohit Goyal
Mohit Goyal
Follow
Nov 4 '24
Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks
#
wordpresssecurity
#
plugindevelopment
#
inspiredmonks
#
websecurity
1
reaction
Comments
Add Comment
2 min read
Authentication and Authorization Techniques in Modern Web Applications
Obinna
Obinna
Obinna
Follow
Oct 28 '24
Authentication and Authorization Techniques in Modern Web Applications
#
authentication
#
jwt
#
oauth
#
websecurity
1
reaction
Comments
Add Comment
4 min read
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 13 '24
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks
#
webdev
#
cybersecuritytips
#
websecurity
#
securecoding
1
reaction
Comments
Add Comment
4 min read
How to Customize the Auth Challenge in SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 16 '24
How to Customize the Auth Challenge in SafeLine WAF
#
cybersecurity
#
websecurity
#
tutorial
#
opensource
13
reactions
Comments
Add Comment
3 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP
Carrie
Carrie
Carrie
Follow
Oct 16 '24
How to Configure SafeLine WAF to Correctly Obtain the Source IP
#
cybersecurity
#
opensource
#
websecurity
12
reactions
Comments
Add Comment
3 min read
The Significance of Website Hacking
Carrie
Carrie
Carrie
Follow
Oct 15 '24
The Significance of Website Hacking
#
websecurity
#
cybersecurity
12
reactions
Comments
Add Comment
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests
Carrie
Carrie
Carrie
Follow
Oct 14 '24
Understanding How an Open Source WAF Monitor HTTP Requests
#
webdev
#
cybersecurity
#
websecurity
#
opensource
11
reactions
Comments
Add Comment
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine
Carrie
Carrie
Carrie
Follow
Oct 14 '24
Demystifying the Technology Architecture of Open Source WAF, SafeLine
#
cybersecurity
#
opensource
#
websecurity
#
webdev
11
reactions
Comments
Add Comment
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)
Carrie
Carrie
Carrie
Follow
Oct 11 '24
Deploying High Availability SafeLine WAF on K3s(Part 4)
#
kubernetes
#
opensource
#
websecurity
#
cybersecurity
17
reactions
Comments
Add Comment
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 10 '24
How to Prevent Brute Force Attacks with SafeLine WAF
#
bruteforce
#
cybersecurity
#
beginners
#
websecurity
14
reactions
Comments
Add Comment
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
Carrie
Carrie
Carrie
Follow
Oct 9 '24
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
#
cybersecurity
#
docker
#
linux
#
websecurity
17
reactions
Comments
Add Comment
3 min read
The Ultimate Guide to Understanding Web Application Authentication
Carrie
Carrie
Carrie
Follow
Oct 9 '24
The Ultimate Guide to Understanding Web Application Authentication
#
authentication
#
webapplication
#
cybersecurity
#
websecurity
18
reactions
Comments
Add Comment
3 min read
The Beginner's Guide to Install and Deploy SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 8 '24
The Beginner's Guide to Install and Deploy SafeLine WAF
#
cybersecurity
#
websecurity
#
beginners
#
opensource
8
reactions
Comments
Add Comment
3 min read
Open Source Tool List for Web App Security
Carrie
Carrie
Carrie
Follow
Oct 6 '24
Open Source Tool List for Web App Security
#
webdev
#
cybersecurity
#
beginners
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure PHP Applications from SQL Injection Attacks
Dhaval Upadhyay
Dhaval Upadhyay
Dhaval Upadhyay
Follow
Oct 6 '24
How to Secure PHP Applications from SQL Injection Attacks
#
sqlinjection
#
websecurity
#
webdev
#
sql
2
reactions
Comments
Add Comment
3 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
Haque.
Haque.
Haque.
Follow
Aug 27 '24
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
#
websecurity
#
webdev
#
cybersecurity
#
devtips
Comments
Add Comment
3 min read
Load Balancing with Reverse Proxy
Carrie
Carrie
Carrie
Follow
Sep 28 '24
Load Balancing with Reverse Proxy
#
cybersecurity
#
webdev
#
websecurity
#
beginners
2
reactions
Comments
Add Comment
3 min read
Addressing Arbitrary Input with SafeLine
Carrie
Carrie
Carrie
Follow
Oct 8 '24
Addressing Arbitrary Input with SafeLine
#
cybersecurity
#
webdev
#
beginners
#
websecurity
1
reaction
Comments
1
comment
3 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
Carrie
Carrie
Carrie
Follow
Sep 19 '24
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
#
webdev
#
cybersecurity
#
websecurity
6
reactions
Comments
Add Comment
2 min read
Five Free WAF Performance Comparison
Carrie
Carrie
Carrie
Follow
Sep 19 '24
Five Free WAF Performance Comparison
#
cybersecurity
#
webdev
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure OpenResty with a Free WAF
Carrie
Carrie
Carrie
Follow
Sep 19 '24
How to Secure OpenResty with a Free WAF
#
websecurity
#
webapplicationfirewall
#
opensource
#
nginx
10
reactions
Comments
Add Comment
3 min read
5 Best Free and Open Source WAF for 2025
Carrie
Carrie
Carrie
Follow
Sep 18 '24
5 Best Free and Open Source WAF for 2025
#
websecurity
#
webapplicationfirewall
#
beginners
#
opensource
9
reactions
Comments
Add Comment
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
Sachin Gadekar
Sachin Gadekar
Sachin Gadekar
Follow
Sep 17 '24
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
#
ssl
#
security
#
websecurity
#
webdev
2
reactions
Comments
1
comment
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31 '24
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 27 '24
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
#
node
#
webdev
#
backend
#
websecurity
1
reaction
Comments
Add Comment
5 min read
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 25 '24
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
#
node
#
websecurity
#
webdev
#
javascript
2
reactions
Comments
Add Comment
7 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
Lulu
Lulu
Lulu
Follow
Aug 2 '24
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
#
opensource
#
github
#
cybersecurity
#
websecurity
14
reactions
Comments
Add Comment
2 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 20 '24
Protect JWT Token from Token Forgery and Data Manipulation Attack
#
javascript
#
websecurity
#
jwt
#
apisecurity
1
reaction
Comments
Add Comment
3 min read
Preventing Weak Cryptography in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 26 '24
Preventing Weak Cryptography in JavaScript
#
javascript
#
websecurity
#
cryptography
#
encryption
Comments
Add Comment
3 min read
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 25 '24
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
#
javascript
#
webdev
#
remotecodeexecution
#
websecurity
Comments
Add Comment
2 min read
Protecting Your JavaScript Applications from DOM-based XSS Attacks
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 24 '24
Protecting Your JavaScript Applications from DOM-based XSS Attacks
#
javascript
#
websecurity
#
xss
#
dom
Comments
Add Comment
3 min read
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 23 '24
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
#
javascript
#
cybersecurity
#
mitmattacks
#
websecurity
2
reactions
Comments
Add Comment
4 min read
Steps to Preventing Prototype Pollution Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 19 '24
Steps to Preventing Prototype Pollution Attacks in JavaScript
#
javascript
#
websecurity
#
prototypepollution
#
securecoding
1
reaction
Comments
Add Comment
3 min read
Preventing Supply Chain Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 18 '24
Preventing Supply Chain Attacks in JavaScript
#
javascript
#
websecurity
#
supplychainattacks
#
softwaresecurity
Comments
Add Comment
2 min read
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 17 '24
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript
#
javascript
#
websecurity
#
csrfprotection
#
javascriptsecurity
1
reaction
Comments
Add Comment
3 min read
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 16 '24
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide
#
javascript
#
websecurity
#
csp
#
webdev
Comments
Add Comment
3 min read
Securing Your API Keys in Frontend Projects
Harem M Smail
Harem M Smail
Harem M Smail
Follow
Jul 16 '24
Securing Your API Keys in Frontend Projects
#
websecurity
#
frontend
#
apisecurity
#
environmentvariables
Comments
Add Comment
2 min read
Preventing Clickjacking Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 22 '24
Preventing Clickjacking Attacks in JavaScript
#
javascript
#
websecurity
#
clickjacking
#
secureweb
53
reactions
Comments
6
comments
3 min read
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 13 '24
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks
#
javascript
#
websecurity
#
xss
#
csrf
1
reaction
Comments
Add Comment
3 min read
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview
maz4l
maz4l
maz4l
Follow
Jul 10 '24
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview
#
ethicalhacking
#
pentesting
#
websecurity
#
bugbountyhunter
2
reactions
Comments
1
comment
3 min read
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 6 '24
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide
#
javascript
#
websecurity
#
sri
#
webdev
4
reactions
Comments
Add Comment
4 min read
GCP Cloud Armor - How to Leverage and add extra layer of security
Chetan Menge
Chetan Menge
Chetan Menge
Follow
Jun 21 '24
GCP Cloud Armor - How to Leverage and add extra layer of security
#
gcp
#
cloudarmor
#
websecurity
#
cloud
2
reactions
Comments
Add Comment
2 min read
HTTPS là gì mà web nào cũng xài (Phần 1)
Thanh Dương Phan
Thanh Dương Phan
Thanh Dương Phan
Follow
May 19 '24
HTTPS là gì mà web nào cũng xài (Phần 1)
#
https
#
websecurity
#
cryptography
1
reaction
Comments
Add Comment
6 min read
Open Web Application Security Project OWASP Top Ten
Ferdous Azad
Ferdous Azad
Ferdous Azad
Follow
Jun 16 '24
Open Web Application Security Project OWASP Top Ten
#
webdev
#
websecurity
#
owasp
#
programming
1
reaction
Comments
Add Comment
3 min read
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication
Vidyarathna Bhat
Vidyarathna Bhat
Vidyarathna Bhat
Follow
Jun 1 '24
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication
#
jwt
#
websecurity
#
authentication
#
jsonwebtoken
5
reactions
Comments
Add Comment
3 min read
Enhancing Security in React with External Script Loading
Antoine
Antoine
Antoine
Follow
for
Itself Tools
May 27 '24
Enhancing Security in React with External Script Loading
#
react
#
nextjs
#
websecurity
#
javascript
1
reaction
Comments
Add Comment
2 min read
Navigating the Risks of Third-Party Libraries in Web
Vigneshwaran
Vigneshwaran
Vigneshwaran
Follow
Jan 28 '24
Navigating the Risks of Third-Party Libraries in Web
#
webdev
#
cybersecurity
#
frontend
#
websecurity
Comments
Add Comment
4 min read
Best Security Practices for Web Browsing
Jonathan Kiptoon
Jonathan Kiptoon
Jonathan Kiptoon
Follow
Jan 13 '24
Best Security Practices for Web Browsing
#
websecurity
#
onlinesafety
Comments
Add Comment
3 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account