<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Julia K</title>
    <description>The latest articles on DEV Community by Julia K (@julia_kot).</description>
    <link>https://dev.to/julia_kot</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1069027%2F78c1aa37-34ef-4824-8296-76f75678624f.jpg</url>
      <title>DEV Community: Julia K</title>
      <link>https://dev.to/julia_kot</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/julia_kot"/>
    <language>en</language>
    <item>
      <title>Automated secure code checks in your workflow</title>
      <dc:creator>Julia K</dc:creator>
      <pubDate>Fri, 01 Dec 2023 18:16:28 +0000</pubDate>
      <link>https://dev.to/julia_kot/automated-secure-code-checks-in-your-workflow-4nga</link>
      <guid>https://dev.to/julia_kot/automated-secure-code-checks-in-your-workflow-4nga</guid>
      <description>&lt;p&gt;Great news from &lt;strong&gt;&lt;a href="https://phpsecure.net/"&gt;PHP Secure Vulnerability Scanner&lt;/a&gt;&lt;/strong&gt;! You asked - we delivered! When we first started, scanning your project required you  to click the Scan button and upload your code. You could package your project and upload it as one archive file, or upload up to 15 individual PHP files. &lt;/p&gt;

&lt;p&gt;Our users asked us to add integrations with &lt;strong&gt;GitHub&lt;/strong&gt; and &lt;strong&gt;GitLab&lt;/strong&gt; to allow automated secure code checks to your CI/CD pipeline. Voila - now you can connect PHP Secure to your repository and run automated scans directly in your workflow!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ijI5Vhrn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o9c8m9wugo77m6p5zkpc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ijI5Vhrn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o9c8m9wugo77m6p5zkpc.png" alt="Image description" width="800" height="755"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Adding secure code checks to your existing workflow is easy. We have included all the step-by-step instructions to make it simple. Just follow the instructions carefully to set it up without a hitch.&lt;/p&gt;

&lt;p&gt;Once connected, every time it is deployed, PHP Secure will check your project for vulnerabilities. Whenever new vulnerabilities are found, you'll be notified. You can view your scan results in your PHP Secure account.&lt;/p&gt;

&lt;p&gt;Keep your applications secure and prevent deployment of vulnerable applications or components (registries) by adding PHP Secure to the build as a step in the pipeline.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--r8zFEx62--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3y83bc9qzlkedntrvj72.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--r8zFEx62--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/3y83bc9qzlkedntrvj72.png" alt="Image description" width="800" height="267"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What do you think of this new feature?&lt;/p&gt;

&lt;p&gt;We strive to be on the cutting edge and offer you a superior product for years to come! Do you have any suggestions for improvement?&lt;/p&gt;

</description>
      <category>github</category>
      <category>gitlab</category>
      <category>vulnerabilities</category>
      <category>php</category>
    </item>
    <item>
      <title>PHP Secure — Launching on Product Hunt</title>
      <dc:creator>Julia K</dc:creator>
      <pubDate>Sat, 28 Oct 2023 09:07:35 +0000</pubDate>
      <link>https://dev.to/julia_kot/php-secure-launching-on-product-hunt-5e5a</link>
      <guid>https://dev.to/julia_kot/php-secure-launching-on-product-hunt-5e5a</guid>
      <description>&lt;p&gt;We’ve just launched a free PHP vulnerability scanner and would love &amp;amp; appreciate your support today if you are a &lt;strong&gt;Product Hunt&lt;/strong&gt; member :) thank you in advance!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.producthunt.com/posts/php-secure"&gt;https://www.producthunt.com/posts/php-secure&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--b7bBy9Eo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c7jutw9uw75wx1s24os6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--b7bBy9Eo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c7jutw9uw75wx1s24os6.png" alt="Image description" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mq-mGTRA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8u2qw9wlrst15orhii7j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mq-mGTRA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8u2qw9wlrst15orhii7j.png" alt="Image description" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PTT4QTez--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6aae1pjpq28w7im605k3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PTT4QTez--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6aae1pjpq28w7im605k3.png" alt="Image description" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--QSptEX1H--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7tb72n9s5clmt3q3etfp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--QSptEX1H--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7tb72n9s5clmt3q3etfp.png" alt="Image description" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JNQLASXU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ja8kq9n3zycsm3zht9ip.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JNQLASXU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ja8kq9n3zycsm3zht9ip.png" alt="Image description" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hK6yMqmP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1tbuv8tfs0grxt67c5sj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hK6yMqmP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1tbuv8tfs0grxt67c5sj.png" alt="Image description" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>startup</category>
      <category>security</category>
      <category>webdev</category>
      <category>news</category>
    </item>
    <item>
      <title>30,000 websites are hacked every single day…</title>
      <dc:creator>Julia K</dc:creator>
      <pubDate>Fri, 27 Oct 2023 08:09:14 +0000</pubDate>
      <link>https://dev.to/julia_kot/30000-websites-are-hacked-every-single-day-34f0</link>
      <guid>https://dev.to/julia_kot/30000-websites-are-hacked-every-single-day-34f0</guid>
      <description>&lt;p&gt;And we’ve done something about it. We’re thrilled to announce the launch of PHP Secure, your new go-to vulnerability scanner!&lt;/p&gt;

&lt;p&gt;PHP Secure proactively scans your website and code to help you manage risks, avert data breaches, and prevent the unthinkable — losing your entire site.&lt;/p&gt;

&lt;p&gt;Just upload your code, and you’ll receive detailed breakdowns of each vulnerability, along with concrete steps to secure any weak spots.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://phpsecure.net/landing/?utm_devto"&gt;De-risk your code now&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Best of all? PHP Secure is currently completely FREE, while comparable services can set you back up to $10,000 a month.&lt;/p&gt;

&lt;p&gt;We’re launching on Product Hunt this Saturday. We’d love it if you could show your support by hitting the subscribe button on our &lt;a href="https://www.producthunt.com/products/php-secure"&gt;Coming Soon page&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>vulnerabilities</category>
      <category>security</category>
      <category>php</category>
      <category>laravel</category>
    </item>
    <item>
      <title>30,000 websites are hacked every single day…</title>
      <dc:creator>Julia K</dc:creator>
      <pubDate>Fri, 27 Oct 2023 08:09:14 +0000</pubDate>
      <link>https://dev.to/julia_kot/30000-websites-are-hacked-every-single-day-3nn7</link>
      <guid>https://dev.to/julia_kot/30000-websites-are-hacked-every-single-day-3nn7</guid>
      <description>&lt;p&gt;And we’ve done something about it. We’re thrilled to announce the launch of PHP Secure, your new go-to vulnerability scanner!&lt;/p&gt;

&lt;p&gt;PHP Secure proactively scans your website and code to help you manage risks, avert data breaches, and prevent the unthinkable — losing your entire site.&lt;/p&gt;

&lt;p&gt;Just upload your code, and you’ll receive detailed breakdowns of each vulnerability, along with concrete steps to secure any weak spots.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://phpsecure.net/landing/?utm_devto"&gt;De-risk your code now&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Best of all? PHP Secure is currently completely FREE, while comparable services can set you back up to $10,000 a month.&lt;/p&gt;

&lt;p&gt;We’re launching on Product Hunt this Saturday. We’d love it if you could show your support by hitting the subscribe button on our &lt;a href="https://www.producthunt.com/products/php-secure"&gt;Coming Soon page&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>SQL Injection: Real Life Attacks and How it Hurts Business</title>
      <dc:creator>Julia K</dc:creator>
      <pubDate>Fri, 28 Apr 2023 09:21:14 +0000</pubDate>
      <link>https://dev.to/julia_kot/sql-injection-real-life-attacks-and-how-it-hurts-business-4009</link>
      <guid>https://dev.to/julia_kot/sql-injection-real-life-attacks-and-how-it-hurts-business-4009</guid>
      <description>&lt;p&gt;A single malware request can hurt your business. Vulnerabilities of your code can result in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Significant data theft
&lt;/li&gt;
&lt;li&gt;Loss of your customers' trust&lt;/li&gt;
&lt;li&gt;Financial losses for you &amp;amp; your users&lt;/li&gt;
&lt;li&gt;Serious fines from regulatory authorities &lt;/li&gt;
&lt;li&gt;Getting blacklisted by Google
…Brand, traffic, money, customers' relationships, website and even business could all be lost in a moment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over the past 20 years, many SQL injection attacks have targeted large and small websites, business and social media platforms. Some of these attacks led to serious data breaches. A few notable examples are listed below.&lt;/p&gt;

&lt;h2&gt;
  
  
  Breaches Enabled by SQL Injection
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Over 100 million payment card records stolen. $200 million paid out in compensation&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.upguard.com/security-report/heartland-payment-systems"&gt;Heartland&lt;/a&gt;, a company specializing in payment, POS, and payroll systems, had been attacked by SQL injection. Heartland suffered irreparable damage, losing a large portion of customers and over $200 million paid out in compensation. Within months of the incident, their stock prices fell 77%.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data theft on 5 million websites&lt;/strong&gt;&lt;br&gt;
In 2021, WooCommerce, a popular ecommerce plugin for WordPress CMS, was found that several of its plugins, features, and software versions were vulnerable to SQLi, and several attacks occurred as a result. Unpatched flaws in the plugin exposed data on 5 million websites to theft. &lt;a href="https://www.bleepingcomputer.com/news/security/woocommerce-fixes-vulnerability-exposing-5-million-sites-to-data-theft/"&gt;Link&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hackers stole 8.3M records via SQL injection&lt;/strong&gt;&lt;br&gt;
In 2020, Freepik, one of the largest online graphic resources sites in the world with 18 million monthly unique users, says that hackers were able to steal emails and password hashes for 8.3M Freepik and Flaticon users in an SQL injection attack against the company's Flaticon website. &lt;a href="https://www.freepikcompany.com/newsroom/statement-on-security-incident-at-freepik-company/"&gt;Link&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;36,000 personal data stolen&lt;/strong&gt;&lt;br&gt;
Hackers targeted 53 universities using SQL injection, stole and published 36,000 personal records belonging to students, faculty, and staff.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;130 million credit card numbers stolen&lt;/strong&gt;&lt;br&gt;
A team of attackers used SQL injection to penetrate corporate systems at several companies, primarily the 7-Eleven retail chain, stealing 130 million credit card numbers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1500 clients were impact&lt;/strong&gt;&lt;br&gt;
Kaseya, an IT solutions provider for MSP and enterprise clients, was a victim of a ransomware attack in 2021. Attackers exploited unpatched SQL vulnerabilities in the company’s VSA servers to impact over 1500 of Kaseya’s clients.&lt;/p&gt;

&lt;h2&gt;
  
  
  Notable SQL Injection Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;3 million WordPress sites had vulnerabilities by critical SEO plugin flaw&lt;/strong&gt;&lt;br&gt;
Two critical and high severity security vulnerabilities in the highly popular "All in One" SEO WordPress plugin exposed over 3 million websites to takeover attacks. &lt;a href="https://www.bleepingcomputer.com/news/security/800k-wordpress-sites-still-impacted-by-critical-seo-plugin-flaw/"&gt;Link&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SQLi let to access 350 million user accounts&lt;/strong&gt;&lt;br&gt;
Fortnite is an online game with over 350 million users. In 2019, a SQL injection vulnerability was discovered which could let attackers access user accounts. The vulnerability was patched.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tesla vulnerability&lt;/strong&gt;&lt;br&gt;
In 2014, security researchers publicized that they were able to breach the website of Tesla using SQL injection, gain administrative privileges and steal user data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cisco vulnerability&lt;/strong&gt;&lt;br&gt;
In 2018, a SQL injection vulnerability was found in Cisco Prime License Manager. The vulnerability allowed attackers to gain shell access to systems on which the license manager was deployed. Cisco has patched the vulnerability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerabilities in the plugin, used in over 100,000 active sites&lt;/strong&gt;&lt;br&gt;
In December, 2022, the WordPress online course plugin 'LearnPress' was vulnerable to multiple critical-severity flaws, including pre-auth SQL injection and local file inclusion. &lt;a href="https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/"&gt;Link&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Preventing SQL Injection Attack
&lt;/h2&gt;

&lt;p&gt;How to reduce risk and protect code from vulnerabilities we'll talk about in the next article.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>security</category>
      <category>php</category>
      <category>laravel</category>
    </item>
  </channel>
</rss>
