Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
IDOR Vulnerability in Symfony: How to Detect and Fix It
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 15 '25
IDOR Vulnerability in Symfony: How to Detect and Fix It
#
cybersecurity
#
symfony
#
php
#
vulnerabilities
2
reactions
Comments
Add Comment
4 min read
Fix It Before They Break It: The True Role of Vulnerability Management
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Mar 11 '25
Fix It Before They Break It: The True Role of Vulnerability Management
#
cybersecurity
#
vulnerabilities
#
vapt
#
threathunting
Comments
Add Comment
2 min read
Prevent CSRF Vulnerabilities in Symfony Easily
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 13 '25
Prevent CSRF Vulnerabilities in Symfony Easily
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
2
reactions
Comments
Add Comment
3 min read
Stop giving hackers the easy button
bfuller
bfuller
bfuller
Follow
Apr 9 '25
Stop giving hackers the easy button
#
security
#
devops
#
vulnerabilities
#
opservations
1
reaction
Comments
Add Comment
4 min read
Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management
Network Intelligence
Network Intelligence
Network Intelligence
Follow
Apr 3 '25
Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management
#
vulnerabilities
#
vulnerabilitymonitoring
#
vulnerabilitymanagement
#
aiincybersecurity
1
reaction
Comments
Add Comment
5 min read
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
Ajinkya Anil Kahane
Ajinkya Anil Kahane
Ajinkya Anil Kahane
Follow
Mar 31 '25
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
#
programming
#
vulnerabilities
#
security
#
api
6
reactions
Comments
5
comments
4 min read
Analyzing a Suspicious Flash Loan Arbitrage Smart Contract
FOBABS
FOBABS
FOBABS
Follow
Feb 18 '25
Analyzing a Suspicious Flash Loan Arbitrage Smart Contract
#
web3
#
smartcontract
#
vulnerabilities
#
blockchain
Comments
Add Comment
3 min read
How to Fix Weak API Authentication in Laravel (With Code Examples)
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 16 '25
How to Fix Weak API Authentication in Laravel (With Code Examples)
#
cybersecurity
#
vulnerabilities
#
laravel
#
api
3
reactions
Comments
Add Comment
3 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
Carrie
Carrie
Carrie
Follow
Mar 14 '25
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
#
vulnerabilities
#
cybersecurity
8
reactions
Comments
Add Comment
3 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025
Namik Ahmadov
Namik Ahmadov
Namik Ahmadov
Follow
Mar 13 '25
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025
#
ai
#
vulnerabilities
#
cybersecurity
#
python
Comments
Add Comment
3 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 13 '25
Prevent Session Replay Attacks in Laravel: A Complete Guide
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
3
reactions
Comments
Add Comment
4 min read
XML Injection in Laravel: Fix It with Secure Coding
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 11 '25
XML Injection in Laravel: Fix It with Secure Coding
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
reactions
Comments
Add Comment
3 min read
How to Prevent Web Cache Deception Attacks in Laravel: A Complete Guide
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 9 '25
How to Prevent Web Cache Deception Attacks in Laravel: A Complete Guide
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
reactions
Comments
Add Comment
4 min read
What is Web Exploitation? Types of Web Exploitation Vulnerabilities
Rachel Ritchay
Rachel Ritchay
Rachel Ritchay
Follow
Mar 4 '25
What is Web Exploitation? Types of Web Exploitation Vulnerabilities
#
web
#
webexploitation
#
vulnerabilities
Comments
Add Comment
7 min read
Prevent JWT Attacks in Laravel with Secure Coding Practices
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 4 '25
Prevent JWT Attacks in Laravel with Secure Coding Practices
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
reactions
Comments
Add Comment
3 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account