Posts by MorphyBishop

@MorphyBishop

Lobby Yang

Working on cybersecurity. Focusing on WAF.
github.com/chaitin/SafeLine Joined March 2026
1.2k Points55 Badges3 Connections5 Followers6 Following

Posts by MorphyBishop

MorphyBishop in Articles 4 min read
APIs are now the primary attack surface for modern applications. REST, GraphQL, gRPC, mobile backends, SaaS integrations — almost every business function is exposed through APIs. At the same time, a large class of attacks is bypassing traditional WA...
MorphyBishop in Articles 5 min read
Modern cloud-native systems are obsessed with decomposition. Applications are split into microservices. Infrastructure becomes declarative. Networks become programmable. Security follows the same trajectory: instead of embedding protection logic dir...
MorphyBishop in Articles 4 min read
SQL injection is one of those vulnerabilities every developer thinks they understand — until their handcrafted “secure” filter gets bypassed by a payload they never anticipated. The pattern repeats constantly: A project launches fast. Someone add...
MorphyBishop in Articles 3 min read
The problem with traditional CAPTCHAs Most developers don’t deploy CAPTCHAs because they like them. They deploy them because bots are expensive: scraping, credential stuffing, fake signups, inventory hoarding. But traditional CAPTCHA systems intro...
MorphyBishop in Articles 3 min read
When engineers push back on deploying a Web Application Firewall WAF, the argument is rarely about whether security matters. It’s about latency. > “How many milliseconds does this thing add?” In high-throughput systems—APIs, real-time services, edg...
MorphyBishop in Articles 3 min read
!Image descriptionhttps://dev-to-uploads.s3.amazonaws.com/uploads/articles/pid6sjmwa0cfdve98ert.webp Last night, players of Battlefield 6 were suddenly kicked out mid-game. Reconnecting didn’t help — they were stuck in endless queues. If you’ve been...
MorphyBishop in Articles 4 min read
In contemporary application architectures, APIs have become the primary attack surface. While most engineering teams have matured their authentication mechanisms—OAuth2, JWT, SSO—the same cannot be said for authorization, particularly at the object l...
MorphyBishop in Articles 2 min read
Security plugins often act as a high-level bandage for architectural vulnerabilities. While convenient, they execute late in the application lifecycle, consuming PHP workers and memory for tasks that are more efficiently handled by the web server. Ha...
MorphyBishop in Articles 3 min read
Web Application Firewalls WAFs have been a standard layer in web security for years. Most traditional WAFs rely heavily on regular expressions regex to detect malicious traffic patterns. While this approach is widely adopted—largely due to engines li...
MorphyBishop in Articles 3 min read
I’ve been running small-to-mid-sized web services for years. My relationship with WAFs has always been conflicted. When something gets hacked, ops takes the blame. When you deploy a traditional WAF, false positives start breaking legitimate traffic. ...
MorphyBishop in Articles 4 min read
From deploying DVWA to blocking real attacks with SafeLine WAF — here’s everything I learned as a beginner with screenshots & code Introduction A few weeks ago I decided it was time to stop just watching YouTube tutorials and actually build somethin...
MorphyBishop in Articles 5 min read
In today’s post we’ll get going at getting SafeLinehttps://github.com/chaitin/safeline excellent WAF Web Application Firewall to agree at running on Rootless Docker setup. Prerequisites##prerequisites + Docker installed in rootless mode dockerd-r...
MorphyBishop in Articles 11 min read
Have you ever wondered if that little credit-card-sized computer, the Raspberry Pi, could be a robust server for your home or small business? The answer is a resounding yes! These versatile devices are incredibly capable of handling everything from m...
MorphyBishop in Articles 4 min read
Modern security teams are not short on alerts. They are drowning in them. Between vulnerability scanners, WAF logs, API gateways, and threat intel feeds, the problem is no longer visibility—it is prioritization. Everything looks like a risk. Everyth...
MorphyBishop in Articles 3 min read
Web Application Firewalls WAFs have been a standard layer in web security for years. They were designed to stop common threats like SQL injection and XSS, and they still do that job reasonably well. The problem is that the threat model has changed. ...
MorphyBishop in Articles 3 min read
If you’ve ever investigated suspicious traffic, blocked IP ranges, or analyzed attack sources, you’ve already interacted with ASN—even if you didn’t realize it. ASN Autonomous System Number is one of the most underused but high-leverage signals in n...
MorphyBishop in Articles 4 min read
When something goes wrong with a website, the first signal is rarely a stack trace or a log file. It’s an HTTP status code. Understanding and systematically checking these codes is one of the fastest ways to diagnose issues across performance, SEO, ...
MorphyBishop in Articles 2 min read
The short answer is no. AI firewalls are not replacing traditional firewalls. They are replacing parts of their detection logic, and in some cases outperforming them at the application layer. To understand what is actually happening, separate three ...
MorphyBishop in Articles 4 min read
Most comparisons between WAF solutions stop at feature lists. That’s not where the real differences show up. The gap appears in deployment friction, rule effectiveness under real traffic, and how much ongoing work is required to keep protection actua...
MorphyBishop in Articles 10 min read
Ever landed on a website, ready to find some information, only to be unceremoniously whisked away to a completely different, often spammy or malicious, site? It’s a frustrating experience for any user, but for website owners, it’s a nightmare. This u...
post-cover-13468
chevron_left

Latest Jobs

View all jobs →