Skip to content
Navigation menu
Search
Log in
Create account
CodeNewbie Community 🌱
Close
#
cybersecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Secure Your Web Apps with SafeLine WAF
Sharon428931
Sharon428931
Sharon428931
Follow
Aug 14
How to Secure Your Web Apps with SafeLine WAF
#
safeline
#
waf
#
cybersecurity
#
webdev
5
 reactions
Comments
1
 comment
2 min read
CVE-2024-6387: Critical OpenSSH Flaw Affects Linux Servers
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 11
CVE-2024-6387: Critical OpenSSH Flaw Affects Linux Servers
#
vulnerability
#
cybersecurity
#
webdev
4
 reactions
Comments
Add Comment
2 min read
From HTTP to HTTPS: How SSL/TLS Protects Your Site
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 10
From HTTP to HTTPS: How SSL/TLS Protects Your Site
#
ssl
#
tls
#
cybersecurity
5
 reactions
Comments
Add Comment
3 min read
Protect Your Site from XSS: Stored, Reflected, and DOM-Based Attacks
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 8
Protect Your Site from XSS: Stored, Reflected, and DOM-Based Attacks
#
xss
#
safeline
#
waf
#
cybersecurity
5
 reactions
Comments
Add Comment
3 min read
Brute Force Protection with SafeLine WAF: What Developers Need to Know
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 8
Brute Force Protection with SafeLine WAF: What Developers Need to Know
#
safeline
#
waf
#
developers
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
Web Shell Attacks Explained (And How to Prevent Them)
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 8
Web Shell Attacks Explained (And How to Prevent Them)
#
webshell
#
cybersecurity
#
webdev
#
beginners
5
 reactions
Comments
Add Comment
2 min read
Nacos Vulnerability Alert: SQLi to RCE in Admin Interface
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 7
Nacos Vulnerability Alert: SQLi to RCE in Admin Interface
#
vulnerability
#
rce
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
3 min read
SafeLine WAF Environment Variables You Should Know
Sharon428931
Sharon428931
Sharon428931
Follow
Aug 12
SafeLine WAF Environment Variables You Should Know
#
webdev
#
safeline
#
waf
#
cybersecurity
5
 reactions
Comments
1
 comment
2 min read
SafeLine WAF's Hidden Config: Understanding the .env File
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 4
SafeLine WAF's Hidden Config: Understanding the .env File
#
safeline
#
waf
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
2 min read
Rate Limiting in SafeLine WAF: Present and Future
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 16
Rate Limiting in SafeLine WAF: Present and Future
#
safeline
#
waf
#
ratelimiting
#
cybersecurity
5
 reactions
Comments
2
 comments
3 min read
Remote Code Execution in Windows Server RDL (CVE-2024-38077)
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 2
Remote Code Execution in Windows Server RDL (CVE-2024-38077)
#
rce
#
cybersecurity
#
vulnerabilities
#
webdev
5
 reactions
Comments
Add Comment
3 min read
CVE-2024-29847: Critical RCE in Ivanti EPM via Insecure .NET Remoting
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 1
CVE-2024-29847: Critical RCE in Ivanti EPM via Insecure .NET Remoting
#
rce
#
vulnerability
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
2 min read
The Better Fit for Modern Web Protection: SafeLine vs Sucuri
Sharon428931
Sharon428931
Sharon428931
Follow
Aug 6
The Better Fit for Modern Web Protection: SafeLine vs Sucuri
#
safeline
#
waf
#
sucur
#
cybersecurity
4
 reactions
Comments
2
 comments
2 min read
5 Best Open Source WAFs to Protect Your Web Apps in 2025
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 24
5 Best Open Source WAFs to Protect Your Web Apps in 2025
#
waf
#
opensource
#
cybersecurity
5
 reactions
Comments
1
 comment
3 min read
New Tomcat RCE Vulnerability (CVE-2024-50379) Affects Windows Servers
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 30
New Tomcat RCE Vulnerability (CVE-2024-50379) Affects Windows Servers
#
cybersecurity
#
vulnerability
#
webdev
#
websecurity
5
 reactions
Comments
Add Comment
3 min read
Remote Command Execution in 1Panel Pro via Certificate Forgery (CVE-2025-54424)
Sharon428931
Sharon428931
Sharon428931
Follow
Aug 5
Remote Command Execution in 1Panel Pro via Certificate Forgery (CVE-2025-54424)
#
rce
#
webdev
#
cybersecurity
#
vulnerabilities
5
 reactions
Comments
1
 comment
2 min read
How We Built Load Balancing and Failover Into SafeLine WAF
Sharon428931
Sharon428931
Sharon428931
Follow
Aug 1
How We Built Load Balancing and Failover Into SafeLine WAF
#
safeline
#
waf
#
cybersecurity
#
beginners
5
 reactions
Comments
1
 comment
3 min read
How to Register an Application in SafeLine
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 23
How to Register an Application in SafeLine
#
safeline
#
waf
#
cybersecurity
5
 reactions
Comments
2
 comments
2 min read
Gogs Hit by High-Risk Linux RCE Flaw — Patch v0.13.3 Now
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 26
Gogs Hit by High-Risk Linux RCE Flaw — Patch v0.13.3 Now
#
vulnerability
#
cybersecurity
#
websecurity
5
 reactions
Comments
Add Comment
2 min read
Optimize SafeLine for Your Traffic: Pick the Best Performance Mode
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 26
Optimize SafeLine for Your Traffic: Pick the Best Performance Mode
#
safeline
#
waf
#
cybersecurity
5
 reactions
Comments
Add Comment
1 min read
New SQLi Vulnerability in e-cology WorkflowServiceXml — Patch Now
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 8
New SQLi Vulnerability in e-cology WorkflowServiceXml — Patch Now
#
webdev
#
sqli
#
vulnerability
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
Confirmed: Fortinet FortiOS/FortiProxy Auth Bypass Bug (CVE-2024-55591)
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 24
Confirmed: Fortinet FortiOS/FortiProxy Auth Bypass Bug (CVE-2024-55591)
#
vulnerabilities
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
3 min read
Rsync Under Attack: New Buffer Overflow Flaws Could Leak Server Data
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 23
Rsync Under Attack: New Buffer Overflow Flaws Could Leak Server Data
#
vulnerabilities
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
2 min read
Think You're Safe from SQL Injection? Think Again
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 23
Think You're Safe from SQL Injection? Think Again
#
webdev
#
sql
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
Mastering Linux Reboots: Commands, Use Cases, and Best Practices
Sharon428931
Sharon428931
Sharon428931
Follow
Jul 11
Mastering Linux Reboots: Commands, Use Cases, and Best Practices
#
linux
#
cybersecurity
#
webdev
#
beginners
6
 reactions
Comments
Add Comment
2 min read
loading...
Log in
Create account