Logo
Login
Tech Posts 31212
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

What is an Incident Response Plan and Why It Matters

Cyber-attacks don’t wait, and neither should your response. A well-prepared incident response plan can be the difference between quick recovery and total chaos. Here’s how it helps protect your bu...
12.04.2025 0 Read More

Explore Pentesting the Easy Way: Using Nmap and Docker

Explore Pentesting the Easy Way: Using Nmap and Docker
In Part 1, we learned how to scan a server and interpret basic Nmap output. Now it’s time to simulate a real pentest — from detecting services to running actual vulnerability scans — all in a sa...
12.04.2025 0 Read More

Prevent CSRF Vulnerabilities in Symfony Easily

Prevent CSRF Vulnerabilities in Symfony Easily
Cross-Site Request Forgery (CSRF) is one of the most common web application vulnerabilities, and yes — even popular PHP frameworks like Symfony are not immune.In this blog post, we'll walk through: ...
13.04.2025 0 Read More

The Backdoor You Didn't Know Existed

The Backdoor You Didn't Know Existed
Introduction In 2014, I was experimenting with a vulnerable virtual machine from VulnHub when I accidentally discovered a way to trigger a system shutdown just by altering a form field. What ...
13.04.2025 0 Read More

Preventing Exploitable Cloud Misconfigurations Using IAM Access Analyzer

Preventing Exploitable Cloud Misconfigurations Using IAM Access Analyzer
Introduction What is IAM and its importance in cloud security? Identity and Access Management (IAM) is an AWS web service that helps you securely control access to AWS resources. IAM...
13.04.2025 0 Read More

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

In the ever-evolving field of cybersecurity, the use of Artificial Intelligence (AI) has changed the manner in which organizations secure themselves from cyber attacks. AI plays a critical role in the...
13.04.2025 0 Read More

XSS URL Analysis and SQL Injection Workflow

In this detailed article, we will dive deeper into the concepts of Cross-Site Scripting (XSS) and SQL Injection vulnerabilities. We will explain their workflows, demonstrate practical examples, provid...
13.04.2025 0 Read More

🔒 Secure ROS2 Setup: Hardening Your Robot Project from the Start

As robotics becomes more accessible and developers take the leap into building their own intelligent machines, the importance of security cannot be overstated. Whether you're tinkering with your first...
13.04.2025 0 Read More

How I Found a CORS Misconfiguration + No Rate Limiting on a Live Website

How I Found a CORS Misconfiguration + No Rate Limiting on a Live Website
While exploring a few public websites last week, I stumbled upon a surprisingly common yet dangerous combination of vulnerabilities — CORS misconfiguration and lack of API rate limiting.These two is...
14.04.2025 0 Read More

When the Breach Strikes: Legal & Practical Steps All Developers Must Know

When the Breach Strikes: Legal & Practical Steps All Developers Must Know
"It was just one exposed endpoint. No issue. right?"That was what a freelance programmer said to herself when she discovered her client's database was scraped overnight. The morning after, the harm wa...
14.04.2025 0 Read More
Loading...
#reading
Ethereum’s Pectra Upgrade on Sepolia Testnet, Candide Labs’ InstaGas, Echooo’s Abstracted Competition, and Etherspot’s X Space
0
Aula02 - Desafie o Sheldon e sua equipe!
0
Top Software Development Outsourcing Companies In 2025
0
🌚 Dark Mode Is Overrated (and I’ll Die On This Hill)
0
AI Girlfriend Pricing: What to Expect and What You Get
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
How to Run DeepSeek Locally Using Ollama
0