Logo
Login
Tech Posts 31249
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Fix It Before They Break It: The True Role of Vulnerability Management

Fix It Before They Break It: The True Role of Vulnerability Management
Before we start let's understand a few keywords Vulnerability: Vulnerability is always defined by the ISO 27002 and VM is a weakness of an asset or group of assets that can be exploited by 1 or more ...
11.03.2025 0 Read More

Prevent File Inclusion in Symfony Apps

Prevent File Inclusion in Symfony Apps
File Inclusion Vulnerabilities are a common and critical security threat in modern PHP applications—including those built using the Symfony framework. If left unchecked, this vulnerability could all...
06.05.2025 0 Read More

Prevent Session Replay Attacks in Laravel: A Complete Guide

Prevent Session Replay Attacks in Laravel: A Complete Guide
Introduction Session Replay Attacks are a significant security threat where attackers can hijack and replay user sessions to gain unauthorized access to sensitive data. In Laravel, which is a...
13.03.2025 0 Read More

Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025

Artificial Intelligence (AI) is everywhere in 2025—securing networks, driving web apps, and even autonomous cars. But here's the catch: AI is not infallible. As a pentester, we're in the ideal posit...
13.03.2025 0 Read More

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)

Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
This exploit disclosure was originally published by Chaitin Security Emergency Response Center. Overview Apache Tomcat is an open-source Java Servlet container and web server that supports Jav...
14.03.2025 0 Read More

How to Fix Weak API Authentication in Laravel (With Code Examples)

How to Fix Weak API Authentication in Laravel (With Code Examples)
🔥 Weak API Authentication in Laravel: Risks & Fixes In today's digital landscape, securing APIs is paramount, especially when using frameworks like Laravel. Weak API authentication can...
16.03.2025 0 Read More

Enhancing Healthcare Cyber Security with Proactive Risk Assessment and DevSecOps

Key Highlights: Healthcare providers faced escalating security threats, including identity theft, fraud, and ransomware, compromising patient data and care delivery, leading to financial and reputati...
17.03.2025 0 Read More

How to Prevent Cross-Site Script Inclusion (XSSI) in Laravel

How to Prevent Cross-Site Script Inclusion (XSSI) in Laravel
Introduction Cross-Site Script Inclusion (XSSI) is a security vulnerability that allows attackers to exploit the way browsers handle script inclusions, potentially leading to unauthorized dat...
18.03.2025 0 Read More

🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

First, let's talk about IAM (Identity and Access Management) 🔐 It basically means signing up or logging into a platform (Authentication), maintaining the session (Session Management) for s...
31.03.2025 0 Read More

Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management

The Future of Vulnerability Management is Continuous and AI-DrivenCybersecurity is no longer just about setting up firewalls and running occasional vulnerability scans. In today’s rapidly evolving t...
03.04.2025 0 Read More
Loading...
#reading
Perl 🐪 Weekly #712 - RIP Zefram
0
Explorando Kaggle en 2025: Aprende, Compite y Crea con IA Generativa
0
How do GANs balance generator and discriminator training?
0
The Power of URL Shorteners in Digital Marketing
0
AI Video Generator Creates 25% More Realistic Physical Interactions Using Smart Planning
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
How to Run DeepSeek Locally Using Ollama
0