Let’s take a scenario like so: I have a web application that allows people to buy software I created.
2017 OWASP Top 10 for PHP Developers Part 4: XML External Entities (XXE)
Ever processed XML files in your web application? If you did, you probably parsed their contents. And if you.
2017 OWASP Top 10 for PHP Developers Part 3: Sensitive Data Exposure
There is a lot of exposed data floating on the web. People hear about such events all the time.
2017 OWASP Top 10 for PHP Developers Part 2: Broken Authentication and Session Management
While browsing the web, you click on a link. The link leads you to a page like this: Looks.
SQL Injection – What it is, how it works & how it can be mitigated
SQL Injection. If You’re decently security-minded, You’ve probably heard of it. But what is it exactly? How does it work.