Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
websecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 18
Understanding CORS: Secure Cross-Origin Resource Sharing in JavaScript
#
javascript
#
websecurity
#
programming
#
webdev
Comments
Add Comment
4 min read
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒
Hexadecimal
Hexadecimal
Hexadecimal
Follow
Nov 28
The Risks of DNS Caching: Stale Data and Security Threats⚠️💻🔒
#
dnscaching
#
networksecurity
#
dataprivacy
#
websecurity
Comments
Add Comment
4 min read
Comprehensive Guide to Cookies in JavaScript
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Dec 17
Comprehensive Guide to Cookies in JavaScript
#
javascript
#
cookies
#
webstorage
#
websecurity
Comments
Add Comment
3 min read
How to Select a WAF for New Webmasters(Part 1)
Carrie
Carrie
Carrie
Follow
Dec 3
How to Select a WAF for New Webmasters(Part 1)
#
webdev
#
cybersecurity
#
websecurity
#
opensource
10
reactions
Comments
Add Comment
4 min read
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm
Carrie
Carrie
Carrie
Follow
Oct 31
Why Rule-based WAFs Can be Easily Bypassed and What is Semantic Analysis Algorithm
#
cybersecurity
#
machinelearning
#
ai
#
websecurity
11
reactions
Comments
Add Comment
4 min read
Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy
Dimcoder
Dimcoder
Dimcoder
Follow
Nov 19
Understanding Cookies: What They Are, How They Work, and Why They Matter for Your Privacy
#
cookies
#
websecurity
#
sessionmanagement
6
reactions
Comments
Add Comment
5 min read
SSRF Attacks: The Silent Threat Hiding in Your Server
Golam_Mostafa
Golam_Mostafa
Golam_Mostafa
Follow
Nov 16
SSRF Attacks: The Silent Threat Hiding in Your Server
#
security
#
websecurity
#
webdev
Comments
Add Comment
1 min read
OAuth and OpenID Connect: Protecting User Authentication Properly
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 11
OAuth and OpenID Connect: Protecting User Authentication Properly
#
websecurity
#
cybersecurity
#
webdev
#
dataprotection
Comments
Add Comment
4 min read
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 9
Common Web Vulnerabilities: How to Prevent and Mitigate Attacks
#
cybersecurity
#
websecurity
#
webdev
#
xss
Comments
Add Comment
5 min read
Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks
Mohit Goyal
Mohit Goyal
Mohit Goyal
Follow
Nov 4
Enhance Your WordPress Site’s Security with the Security Header Plugin by Inspired Monks
#
wordpresssecurity
#
plugindevelopment
#
inspiredmonks
#
websecurity
1
reaction
Comments
Add Comment
2 min read
Authentication and Authorization Techniques in Modern Web Applications
Obinna
Obinna
Obinna
Follow
Oct 28
Authentication and Authorization Techniques in Modern Web Applications
#
authentication
#
jwt
#
oauth
#
websecurity
1
reaction
Comments
Add Comment
4 min read
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks
Okoye Ndidiamaka
Okoye Ndidiamaka
Okoye Ndidiamaka
Follow
Oct 13
Cross-Site Scripting and CSRF: Secure Your Web Application against Common Attacks
#
webdev
#
cybersecuritytips
#
websecurity
#
securecoding
1
reaction
Comments
Add Comment
4 min read
How to Customize the Auth Challenge in SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 16
How to Customize the Auth Challenge in SafeLine WAF
#
cybersecurity
#
websecurity
#
tutorial
#
opensource
13
reactions
Comments
Add Comment
3 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP
Carrie
Carrie
Carrie
Follow
Oct 16
How to Configure SafeLine WAF to Correctly Obtain the Source IP
#
cybersecurity
#
opensource
#
websecurity
12
reactions
Comments
Add Comment
3 min read
The Significance of Website Hacking
Carrie
Carrie
Carrie
Follow
Oct 15
The Significance of Website Hacking
#
websecurity
#
cybersecurity
12
reactions
Comments
Add Comment
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests
Carrie
Carrie
Carrie
Follow
Oct 14
Understanding How an Open Source WAF Monitor HTTP Requests
#
webdev
#
cybersecurity
#
websecurity
#
opensource
11
reactions
Comments
Add Comment
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine
Carrie
Carrie
Carrie
Follow
Oct 14
Demystifying the Technology Architecture of Open Source WAF, SafeLine
#
cybersecurity
#
opensource
#
websecurity
#
webdev
12
reactions
Comments
Add Comment
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)
Carrie
Carrie
Carrie
Follow
Oct 11
Deploying High Availability SafeLine WAF on K3s(Part 4)
#
kubernetes
#
opensource
#
websecurity
#
cybersecurity
17
reactions
Comments
Add Comment
4 min read
How to Prevent Brute Force Attacks with SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 10
How to Prevent Brute Force Attacks with SafeLine WAF
#
bruteforce
#
cybersecurity
#
beginners
#
websecurity
14
reactions
Comments
Add Comment
3 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
Carrie
Carrie
Carrie
Follow
Oct 9
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment
#
cybersecurity
#
docker
#
linux
#
websecurity
17
reactions
Comments
Add Comment
3 min read
The Ultimate Guide to Understanding Web Application Authentication
Carrie
Carrie
Carrie
Follow
Oct 9
The Ultimate Guide to Understanding Web Application Authentication
#
authentication
#
webapplication
#
cybersecurity
#
websecurity
18
reactions
Comments
Add Comment
3 min read
The Beginner's Guide to Install and Deploy SafeLine WAF
Carrie
Carrie
Carrie
Follow
Oct 8
The Beginner's Guide to Install and Deploy SafeLine WAF
#
cybersecurity
#
websecurity
#
beginners
#
opensource
7
reactions
Comments
Add Comment
3 min read
Open Source Tool List for Web App Security
Carrie
Carrie
Carrie
Follow
Oct 6
Open Source Tool List for Web App Security
#
webdev
#
cybersecurity
#
beginners
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure PHP Applications from SQL Injection Attacks
Dhaval Upadhyay
Dhaval Upadhyay
Dhaval Upadhyay
Follow
Oct 6
How to Secure PHP Applications from SQL Injection Attacks
#
sqlinjection
#
websecurity
#
webdev
#
sql
1
reaction
Comments
Add Comment
3 min read
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
Haque.
Haque.
Haque.
Follow
Aug 27
Essential Security Practices for Web Developers: Keep Your Code Safe and Sound
#
websecurity
#
webdev
#
cybersecurity
#
devtips
Comments
Add Comment
3 min read
Load Balancing with Reverse Proxy
Carrie
Carrie
Carrie
Follow
Sep 28
Load Balancing with Reverse Proxy
#
cybersecurity
#
webdev
#
websecurity
#
beginners
2
reactions
Comments
Add Comment
3 min read
Addressing Arbitrary Input with SafeLine
Carrie
Carrie
Carrie
Follow
Oct 8
Addressing Arbitrary Input with SafeLine
#
cybersecurity
#
webdev
#
beginners
#
websecurity
1
reaction
Comments
1
comment
3 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
Carrie
Carrie
Carrie
Follow
Sep 19
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS
#
webdev
#
cybersecurity
#
websecurity
6
reactions
Comments
Add Comment
2 min read
Five Free WAF Performance Comparison
Carrie
Carrie
Carrie
Follow
Sep 19
Five Free WAF Performance Comparison
#
cybersecurity
#
webdev
#
websecurity
2
reactions
Comments
Add Comment
4 min read
How to Secure OpenResty with a Free WAF
Carrie
Carrie
Carrie
Follow
Sep 19
How to Secure OpenResty with a Free WAF
#
websecurity
#
webapplicationfirewall
#
opensource
#
nginx
10
reactions
Comments
Add Comment
3 min read
5 Best Free and Open Source WAF for 2025
Carrie
Carrie
Carrie
Follow
Sep 18
5 Best Free and Open Source WAF for 2025
#
websecurity
#
webapplicationfirewall
#
beginners
#
opensource
8
reactions
Comments
Add Comment
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
Sachin Gadekar
Sachin Gadekar
Sachin Gadekar
Follow
Sep 17
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
#
ssl
#
security
#
websecurity
#
webdev
1
reaction
Comments
1
comment
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Aug 31
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
#
sqlinjection
#
websecurity
#
cybersecurity
#
dataprotection
Comments
Add Comment
2 min read
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 27
Mastering Web Development: Cookies, Authorization, Authentication, and File Uploads in Node.js
#
node
#
webdev
#
backend
#
websecurity
1
reaction
Comments
Add Comment
5 min read
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
Sushant Gaurav
Sushant Gaurav
Sushant Gaurav
Follow
Aug 25
Securing Web Applications: Stateful vs. Stateless Systems, Authentication, and Authorization in Node.js
#
node
#
websecurity
#
webdev
#
javascript
2
reactions
Comments
Add Comment
7 min read
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
Lulu
Lulu
Lulu
Follow
Aug 2
Unlock a New Era of Cybersecurity: Free and Open-Source WAF Makes Website Protection Effortless!
#
opensource
#
github
#
cybersecurity
#
websecurity
14
reactions
Comments
Add Comment
2 min read
Protect JWT Token from Token Forgery and Data Manipulation Attack
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 20
Protect JWT Token from Token Forgery and Data Manipulation Attack
#
javascript
#
websecurity
#
jwt
#
apisecurity
1
reaction
Comments
Add Comment
3 min read
Preventing Weak Cryptography in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 26
Preventing Weak Cryptography in JavaScript
#
javascript
#
websecurity
#
cryptography
#
encryption
Comments
Add Comment
3 min read
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 25
Preventing Remote Code Execution (RCE) Attacks in JavaScript Applications
#
javascript
#
webdev
#
remotecodeexecution
#
websecurity
Comments
Add Comment
2 min read
Protecting Your JavaScript Applications from DOM-based XSS Attacks
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 24
Protecting Your JavaScript Applications from DOM-based XSS Attacks
#
javascript
#
websecurity
#
xss
#
dom
Comments
Add Comment
3 min read
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 23
Steps to Preventing Man-in-the-Middle (MitM) Attacks in JavaScript Applications
#
javascript
#
cybersecurity
#
mitmattacks
#
websecurity
2
reactions
Comments
Add Comment
4 min read
Steps to Preventing Prototype Pollution Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 19
Steps to Preventing Prototype Pollution Attacks in JavaScript
#
javascript
#
websecurity
#
prototypepollution
#
securecoding
1
reaction
Comments
Add Comment
3 min read
Preventing Supply Chain Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 18
Preventing Supply Chain Attacks in JavaScript
#
javascript
#
websecurity
#
supplychainattacks
#
softwaresecurity
Comments
Add Comment
2 min read
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 17
Understanding and Preventing Cross-Site Request Forgery (CSRF) in JavaScript
#
javascript
#
websecurity
#
csrfprotection
#
javascriptsecurity
1
reaction
Comments
Add Comment
3 min read
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 16
Mastering Content Security Policy (CSP) for JavaScript Applications: A Practical Guide
#
javascript
#
websecurity
#
csp
#
webdev
Comments
Add Comment
3 min read
Securing Your API Keys in Frontend Projects
Harem M Smail
Harem M Smail
Harem M Smail
Follow
Jul 16
Securing Your API Keys in Frontend Projects
#
websecurity
#
frontend
#
apisecurity
#
environmentvariables
Comments
Add Comment
2 min read
Preventing Clickjacking Attacks in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 22
Preventing Clickjacking Attacks in JavaScript
#
javascript
#
websecurity
#
clickjacking
#
secureweb
53
reactions
Comments
6
comments
3 min read
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 13
Advanced Techniques for Detecting and Preventing JavaScript Injection Attacks
#
javascript
#
websecurity
#
xss
#
csrf
1
reaction
Comments
Add Comment
3 min read
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview
maz4l
maz4l
maz4l
Follow
Jul 10
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview
#
ethicalhacking
#
pentesting
#
websecurity
#
bugbountyhunter
2
reactions
Comments
1
comment
3 min read
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 6
Securing JavaScript Applications with Subresource Integrity (SRI): A Comprehensive Guide
#
javascript
#
websecurity
#
sri
#
webdev
4
reactions
Comments
Add Comment
4 min read
GCP Cloud Armor - How to Leverage and add extra layer of security
Chetan Menge
Chetan Menge
Chetan Menge
Follow
Jun 21
GCP Cloud Armor - How to Leverage and add extra layer of security
#
gcp
#
cloudarmor
#
websecurity
#
cloud
2
reactions
Comments
Add Comment
2 min read
HTTPS là gì mà web nào cũng xài (Phần 1)
Thanh Dương Phan
Thanh Dương Phan
Thanh Dương Phan
Follow
May 19
HTTPS là gì mà web nào cũng xài (Phần 1)
#
https
#
websecurity
#
cryptography
1
reaction
Comments
Add Comment
6 min read
Open Web Application Security Project OWASP Top Ten
Ferdous Azad
Ferdous Azad
Ferdous Azad
Follow
Jun 16
Open Web Application Security Project OWASP Top Ten
#
webdev
#
websecurity
#
owasp
#
programming
1
reaction
Comments
Add Comment
3 min read
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication
Vidyarathna Bhat
Vidyarathna Bhat
Vidyarathna Bhat
Follow
Jun 1
Understanding JSON Web Tokens (JWT) and Their Use in Web Authentication
#
jwt
#
websecurity
#
authentication
#
jsonwebtoken
5
reactions
Comments
Add Comment
3 min read
Enhancing Security in React with External Script Loading
Antoine
Antoine
Antoine
Follow
for
Itself Tools
May 27
Enhancing Security in React with External Script Loading
#
react
#
nextjs
#
websecurity
#
javascript
1
reaction
Comments
Add Comment
2 min read
Navigating the Risks of Third-Party Libraries in Web
Vigneshwaran
Vigneshwaran
Vigneshwaran
Follow
Jan 28
Navigating the Risks of Third-Party Libraries in Web
#
webdev
#
cybersecurity
#
frontend
#
websecurity
Comments
Add Comment
4 min read
Best Security Practices for Web Browsing
Jonathan Kiptoon
Jonathan Kiptoon
Jonathan Kiptoon
Follow
Jan 13
Best Security Practices for Web Browsing
#
websecurity
#
onlinesafety
Comments
Add Comment
3 min read
Story of SSRF from Stored XSS in PDF generator application
Ruheza, NS
Ruheza, NS
Ruheza, NS
Follow
Dec 19 '23
Story of SSRF from Stored XSS in PDF generator application
#
ssrf
#
websecurity
#
javascriptlibraries
#
xss
3
reactions
Comments
3
comments
3 min read
OWASP Top 10 - Write-up - TryHackMe
Frank Osasere Idugboe
Frank Osasere Idugboe
Frank Osasere Idugboe
Follow
Oct 25 '23
OWASP Top 10 - Write-up - TryHackMe
#
cybersecurity
#
senseleaner
#
websecurity
#
onlinesecurity
21
reactions
Comments
Add Comment
7 min read
Common Web Security Attacks and Top Tips to Protect Your Website
Thea
Thea
Thea
Follow
Apr 18 '23
Common Web Security Attacks and Top Tips to Protect Your Website
#
websecurity
#
cybersecurity
#
webprotection
#
webdev
9
reactions
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account