DevNestOWASP Top 10 — explained with examplesIn this article I’m going to discuss about one of the most important topics in web application security: the OWASP Top 10.Mar 4, 2023Mar 4, 2023
DevNestJavascript mutation testing made easy with StrykerMutation testing is a software testing technique that involves making small changes to the source code, called mutations and then running…Feb 26, 2023Feb 26, 2023
DevNestUnit Tests vs Integration Tests — Which Matters More?Yet another blogpost about integration and unit tests? Well yes, even though there are lots of articles about this subject, I’ve seen that…Feb 22, 2023Feb 22, 2023
DevNestProtect Your Laravel App from Cross Site Scripting (XSS) Attacks: Best Practices and Prevention…Cross Site Scripting (XSS) is a type of security vulnerability that can allow attackers to inject malicious scripts, such as JavaScript…Feb 20, 2023Feb 20, 2023
DevNestSecuring Your Web Application: How to Fix a Vulnerability in Symfony HTTP Cache ComponentWhat is the impact of CVE-2022–24894 vulnerabilityFeb 19, 2023Feb 19, 2023
DevNestHow to bypass sudo — exploit cve-2023–22809 vulnerabilityRecently, a new security vulnerability was discovered and reported by security researchers, named CVE-2023–22809.Feb 10, 20232Feb 10, 20232
DevNestProfile Guided Optimization (PGO) with PHPIn the following article we will explore the use of Profile Guided Optimization (PGO) with PHP and the benefits it can bring to your…Feb 6, 2023Feb 6, 2023