Пентестинг: основы, преимущества и применение Post date July 1, 2025 Post author By CyberSec Pro Post categories In cybersecurity, infosec, pentest, vulnerabilities
Ivanti EPM RCE via .NET Remoting Deserialization (CVE-2024-29847) Post date July 1, 2025 Post author By Sharon Post categories In epm, ivanti, remotecodeexecution, vulnerabilities
Symfony Command Injection: Risks & Secure Coding Post date July 1, 2025 Post author By Pentest Testing Corp Post categories In cybersecurity, symfony, vulnerabilities, webdev
CVE-2022-46166 – Template Injection – Remote Code Execution Post date June 30, 2025 Post author By Tim Conrad Post categories In cve, security, vulnerabilities
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps Post date June 10, 2025 Post author By Sharon Post categories In cybersecurity, nextjs, vulnerabilities, webdev
RedTiger: Advanced Automated XSS Vulnerability Testing Tool Post date June 7, 2025 Post author By Mohamed Post categories In Automation, cybersecurity, testing, vulnerabilities
Prevent CSRF Vulnerabilities in Symfony Easily Post date April 13, 2025 Post author By Pentest Testing Corp Post categories In coding, cybersecurity, symfony, vulnerabilities
Stop giving hackers the easy button Post date April 9, 2025 Post author By bfuller Post categories In devops, opservations, security, vulnerabilities
Learn to Detect & Prevent JSD Attacks With This Guide Post date April 7, 2025 Post author By Raju Dandigam Post categories In JavaScript, security, security-testing, ui, vulnerabilities, web, web-development, xss
How to Fix Weak API Authentication in Laravel (With Code Examples) Post date March 16, 2025 Post author By Pentest Testing Corp Post categories In api, cybersecurity, laravel, vulnerabilities
Fix OAuth Misconfigurations in Laravel: Best Practices Post date March 2, 2025 Post author By Pentest Testing Corp Post categories In cybersecurity, laravel, oauth, vulnerabilities
Prevent Business Logic Vulnerabilities in Laravel Post date February 27, 2025 Post author By Pentest Testing Corp Post categories In cybersecurity, laravel, php, vulnerabilities
LDAP Injection in Laravel: Prevention & Secure Coding Post date February 9, 2025 Post author By Pentest Testing Corp Post categories In cybersecurity, laravel, php, vulnerabilities
Step up by moving from a reactive state to a proactive state Post date February 6, 2025 Post author By Sudheer Lagisetty Post categories In cybersecurity, devops, docker, vulnerabilities
Generative AI’s Double-Edged Sword: Unlocking Potential While Mitigating Risks Post date February 5, 2025 Post author By Mend.io Post categories In application-security, artificial-intelligence, cybersecurity, good-company, mend, risk-management, shadow-ai, vulnerabilities
Prevent Insecure Deserialization in Laravel: A Comprehensive Guide Post date January 19, 2025 Post author By Pentest Testing Corp Post categories In cybersecurity, laravel, php, vulnerabilities
Prevent HTTP Response Splitting in Laravel: Tips & Examples Post date January 16, 2025 Post author By Pentest Testing Corp Post categories In cybersecurity, laravel, php, vulnerabilities
Exportar u Obtener Hallazgos en AWS Inspector Post date November 1, 2024 Post author By Willie Post categories In cloudcomputing, cloudsecurity, tutorial, vulnerabilities
Increased LLM Vulnerabilities from Fine-tuning and Quantization: Appendix Post date October 17, 2024 Post author By Quantization Post categories In adversarial-attacks, alignment-training, fine-tuning, guardrails, jailbreaking, large-language-models-(llms), quantization, vulnerabilities
Increased LLM Vulnerabilities from Fine-tuning and Quantization: Conclusion and References Post date October 17, 2024 Post author By Quantization Post categories In adversarial-attacks, alignment-training, fine-tuning, guardrails, jailbreaking, large-language-models-(llms), quantization, vulnerabilities
Increased LLM Vulnerabilities from Fine-tuning and Quantization: Experiment Set-up & Results Post date October 17, 2024 Post author By Quantization Post categories In adversarial-attacks, alignment-training, fine-tuning, guardrails, jailbreaking, large-language-models-(llms), quantization, vulnerabilities
Ensuring Security in Smart Contract Applications: The Importance of Robust Coding Practices Post date October 5, 2024 Post author By Abuh Ibrahim Sani Post categories In code-auditing, code-testing, coding-practices, cybersecurity, reentrancy-attack, smart-contract-security, smart-contracts, vulnerabilities
VSCode Extension for finding Vulnerabilities and Outdated Dependencies. Post date September 15, 2024 Post author By Sunil Kumar Post categories In Auditing, extensions, vscode, vulnerabilities
A Critical Fix for a 5-Year Old Vulnerability through Docker’s Security Patch Post date September 12, 2024 Post author By Dr. Vamsi Mohan Vandrangi Post categories In containers, docker, security, vulnerabilities
Scanning AWS S3 Buckets for Security Vulnerabilities Post date August 27, 2024 Post author By Ibrahim Salami Post categories In aws, s3, security, vulnerabilities
11 Cybersecurity Risks for NFT Buyers Post date August 20, 2024 Post author By Zac Amos Post categories In cyber-scams, cyber-threats, cyberattacks, nft, nft-scams, phishing, should-i-buy-an-nft, vulnerabilities
Web Application Penetration Testing: An In-Depth Guide Post date August 19, 2024 Post author By Salman Post categories In beginners, cybersecurity, linux, vulnerabilities
Securing the AWS Infrastructure Post date July 14, 2024 Post author By Hemalatha Ramanujam Post categories In aws, security, vpc, vulnerabilities
Cyber Scum Are Free To Exploit Vulnerabilities Without Fear Post date July 4, 2024 Post author By Technology News Australia Post categories In cybercrime, cybercrime-penalties, cybersecurity-policies, cybersecurity-tips, digital-forensics, digital-security, exploit, vulnerabilities
buffer Overflow (Application Vulnerability) Post date June 24, 2024 Post author By BEIDI DINA SAMUEL Post categories In bufferoverflo, vulnerabilities, vulnerability
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite Post date June 19, 2024 Post author By FFFF:0000h Post categories In api, cybersecurity, vulnerabilities, webdev
Data Engineering and Secure Coding with a Vulnerability Database Post date December 29, 2021 Post author By sagu94271 Post categories In datascience, python, vulnerabilities, whitesource
Protect Your Kindle From Hackers Post date September 28, 2021 Post author By Zen Chan Post categories In checkpoint-research, cybersecurity, ebooks, hackernoon-top-story, kindle, protect-your-kindle-hackers, technology, vulnerabilities, web-monetization
What Vulnerabilities FreakOut Takes Advantage of for Creating a Botnet Post date September 4, 2021 Post author By Check Point Software Post categories In botnet, checkpoint, cyber-attack, cybersecurity, good-company, malware, security, vulnerabilities
CVEs: How Keeping a Catalogue of Common Vulnerabilities and Exposures Helps Your Company Post date August 17, 2021 Post author By Deepak Gupta Post categories In cloud-computing, cloud-security, cyber-threats, cybersecurity, data-security, enterprise-security, security, vulnerabilities
[JavaScript] Super dangerous, underrated vulnerability impacting JavaScript apps! Post date July 7, 2021 Post author By Yuma-Tsushima Post categories In JavaScript, node, npm, vulnerabilities
Improving Open-source Software Security for Java Developers Post date June 16, 2021 Post author By Ax Sharma Post categories In cybersecurity, developer, java, maven, open source, security, technology, vulnerabilities, web-monetization
Spotlight on the Server-Side: A Guide to SSRF Vulnerabilities Post date May 25, 2021 Post author By HackerOne Post categories In bug-bounty, bugs, good-company, hacker, hackernoon-top-story, server-side-code, vulnerabilities, vulnerability-management
Common Web Security Vulnerabilities Post date May 9, 2021 Post author By SmartScanner Post categories In cross-site-scripting, good-company, hacking, passwords, security, vulnerabilities, web-security, web-vulnerabilities
4 Common Web App Vulnerabilities and How to Combat Them Post date April 25, 2021 Post author By MobiDev Post categories In cyber-security, cybersecurity, cybersecurity-tips, good-company, quality-assurance, security, vulnerabilities, web-development
There Are More Risks Associated With SaaS Data Security Than Potential GDPR Fines Post date March 10, 2021 Post author By Rakesh Soni Post categories In cloud, data-privacy, data-security, enterprise, ransomware, risk-management, saas, vulnerabilities