PinnedThese 7 PHP mistakes leave your website open to the hackersMake these mistakes and hackers will attack your web application using Cross Site Scripting, SQL Injection, Path Traversal, and other…Aug 15, 20211Aug 15, 20211
Pinned14 Software Security Terms You Should Knowa guide to essential software security termsDec 30, 2020Dec 30, 2020
Online Robots.txt Validator For Creating a Secure Robots.txtA robots.txt file is a small but important part of a website. It is a plain text file that is placed in the root directory of a website and…Sep 13Sep 13
Published inSystem WeaknessWeb Scanner, A Must Have Tool For Web DevelopersAs the internet grows and technology advances, web development has become more complex, and so has web security. Web developers must use…Mar 25Mar 25
Published inSystem WeaknessSecure Coding 101: How to Read and Write Files SecurelyWorking with files is a common requirement in many applications, but it also introduces several potential security vulnerabilities. In this…Sep 2, 2023Sep 2, 2023
Published inSystem WeaknessSecure Coding 101: How to Use Random FunctionRandom numbers are everywhere on the web, and your security depends on them. Let's see if you're using them right.Jun 18, 2023Jun 18, 2023
Published inSystem Weakness3 reasons why any website’s security is importantYou might think that security is important but only for big companies. This article is going to change your mind.Jan 28, 2023Jan 28, 2023
Published inSystem WeaknessHow to Secure Your WordPress WebsiteKnowing how to secure your WordPress website can protect the site from hackers and malware. This article shows you how to implement this…Dec 13, 2022Dec 13, 2022
Published inDev GeniusUpdate Cheat Sheet for DevelopersUsing an outdated application is a high-risk vulnerability that has an easy fix. This guide provides easy-to-follow instructions for…Sep 26, 2022Sep 26, 2022
Published inSystem WeaknessCSRF, XXE, and 12 Other Security Acronyms ExplainedAcronyms are shortcuts, and we love using them, specially the catchy ones! Let’s decipher some commonly used acronyms in the cyber security…Jul 23, 2022Jul 23, 2022