Logo
Login
Tech Posts 31382
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Fix It Before They Break It: The True Role of Vulnerability Management

Fix It Before They Break It: The True Role of Vulnerability Management
Before we start let's understand a few keywords Vulnerability: Vulnerability is always defined by the ISO 27002 and VM is a weakness of an asset or group of assets that can be exploited by 1 or more ...
11.03.2025 0 Read More

Prevent File Inclusion in Symfony Apps

Prevent File Inclusion in Symfony Apps
File Inclusion Vulnerabilities are a common and critical security threat in modern PHP applications—including those built using the Symfony framework. If left unchecked, this vulnerability could all...
06.05.2025 0 Read More

Prevent Session Replay Attacks in Laravel: A Complete Guide

Prevent Session Replay Attacks in Laravel: A Complete Guide
Introduction Session Replay Attacks are a significant security threat where attackers can hijack and replay user sessions to gain unauthorized access to sensitive data. In Laravel, which is a...
13.03.2025 0 Read More

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Artificial Intelligence (AI) is everywhere in 2025—securing networks, driving web apps, and even autonomous cars. But here's the catch: AI is not infallible. As a pentester, we're in the ideal posit...
13.03.2025 0 Read More

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
This exploit disclosure was originally published by Chaitin Security Emergency Response Center. Overview Apache Tomcat is an open-source Java Servlet container and web server that supports Jav...
14.03.2025 0 Read More

How to Fix Weak API Authentication in Laravel (With Code Examples)

How to Fix Weak API Authentication in Laravel (With Code Examples)
🔥 Weak API Authentication in Laravel: Risks & Fixes In today's digital landscape, securing APIs is paramount, especially when using frameworks like Laravel. Weak API authentication can...
16.03.2025 0 Read More

Enhancing Healthcare Cyber Security with Proactive Risk Assessment and DevSecOps

Key Highlights: Healthcare providers faced escalating security threats, including identity theft, fraud, and ransomware, compromising patient data and care delivery, leading to financial and reputati...
17.03.2025 0 Read More

How to Prevent Cross-Site Script Inclusion (XSSI) in Laravel

How to Prevent Cross-Site Script Inclusion (XSSI) in Laravel
Introduction Cross-Site Script Inclusion (XSSI) is a security vulnerability that allows attackers to exploit the way browsers handle script inclusions, potentially leading to unauthorized dat...
18.03.2025 0 Read More

🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

First, let's talk about IAM (Identity and Access Management) 🔐 It basically means signing up or logging into a platform (Authentication), maintaining the session (Session Management) for s...
31.03.2025 0 Read More

Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management

The Future of Vulnerability Management is Continuous and AI-DrivenCybersecurity is no longer just about setting up firewalls and running occasional vulnerability scans. In today’s rapidly evolving t...
03.04.2025 0 Read More
Loading...
#reading
Why Moving from US Cloud to EU Cloud is Still a Big Question:
0
Using Laravel Octane + RoadRunner to Build a Supersonic Application Server
0
Code or No Code? The AI Revolution in Web Development
0
How to Design a Low Poly Hindenburg Using 3D CAD Software
0
Git Tales: Secrets in the Shadows
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
Beginner's Guide to the Model Context Protocol (MCP)
0
What is Model Context Protocol (MCP): Explained in detail
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
The Great AI Agent Protocol Race: Function Calling vs. MCP vs. A2A
0