Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Fix It Before They Break It: The True Role of Vulnerability Management
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Mar 11 '25
Fix It Before They Break It: The True Role of Vulnerability Management
#
cybersecurity
#
vulnerabilities
#
vapt
#
threathunting
Comments
Add Comment
2 min read
Prevent CSRF Vulnerabilities in Symfony Easily
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 13 '25
Prevent CSRF Vulnerabilities in Symfony Easily
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
2
 reactions
Comments
Add Comment
3 min read
Stop giving hackers the easy button
bfuller
bfuller
bfuller
Follow
Apr 9 '25
Stop giving hackers the easy button
#
security
#
devops
#
vulnerabilities
#
opservations
1
 reaction
Comments
Add Comment
4 min read
Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management
Network Intelligence
Network Intelligence
Network Intelligence
Follow
Apr 3 '25
Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management
#
vulnerabilities
#
vulnerabilitymonitoring
#
vulnerabilitymanagement
#
aiincybersecurity
1
 reaction
Comments
Add Comment
5 min read
đ Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
Ajinkya Anil Kahane
Ajinkya Anil Kahane
Ajinkya Anil Kahane
Follow
Mar 31 '25
đ Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
#
programming
#
vulnerabilities
#
security
#
api
6
 reactions
Comments
5
 comments
4 min read
How to Fix Weak API Authentication in Laravel (With Code Examples)
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 16 '25
How to Fix Weak API Authentication in Laravel (With Code Examples)
#
cybersecurity
#
vulnerabilities
#
laravel
#
api
3
 reactions
Comments
Add Comment
3 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
Carrie
Carrie
Carrie
Follow
Mar 14 '25
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
#
vulnerabilities
#
cybersecurity
8
 reactions
Comments
Add Comment
3 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025
Namik Ahmadov
Namik Ahmadov
Namik Ahmadov
Follow
Mar 13 '25
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025
#
ai
#
vulnerabilities
#
cybersecurity
#
python
Comments
Add Comment
3 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 13 '25
Prevent Session Replay Attacks in Laravel: A Complete Guide
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
3
 reactions
Comments
Add Comment
4 min read
XML Injection in Laravel: Fix It with Secure Coding
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 11 '25
XML Injection in Laravel: Fix It with Secure Coding
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
 reactions
Comments
Add Comment
3 min read
How to Prevent Web Cache Deception Attacks in Laravel: A Complete Guide
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 9 '25
How to Prevent Web Cache Deception Attacks in Laravel: A Complete Guide
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
 reactions
Comments
Add Comment
4 min read
What is Web Exploitation? Types of Web Exploitation Vulnerabilities
Rachel Ritchay
Rachel Ritchay
Rachel Ritchay
Follow
Mar 4 '25
What is Web Exploitation? Types of Web Exploitation Vulnerabilities
#
web
#
webexploitation
#
vulnerabilities
Comments
Add Comment
7 min read
Prevent JWT Attacks in Laravel with Secure Coding Practices
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 4 '25
Prevent JWT Attacks in Laravel with Secure Coding Practices
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
 reactions
Comments
Add Comment
3 min read
Prevent Business Logic Vulnerabilities in Laravel
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Feb 27 '25
Prevent Business Logic Vulnerabilities in Laravel
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
3
 reactions
Comments
Add Comment
3 min read
Looking for potential vulnerabilities in code, part 2: practice
Anna Voronina
Anna Voronina
Anna Voronina
Follow
Feb 25 '25
Looking for potential vulnerabilities in code, part 2: practice
#
java
#
security
#
programming
#
vulnerabilities
Comments
2
 comments
14 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account