It’s nice to have a way for customers to export a long list of data. For example, I work a lot on Upwork, and they have a feature to export…
If you’re a coder, you might not keep up with the latest vulnerabilities and data breaches. One of the most common exploits is SQL injection. PHP developers often build SQL…
PHP is probably one of the most vulnerable languages for SQL injection (SQLi), mainly because many developers build queries dynamically using strings. PHP has prepared statements in its native class…
If you’re writing a WordPress plugin, you don’t want to write features that allow your users to be vulnerable to security bugs. The current_user_can function is a native WordPress security…
To avoid Cross-Site Request Forgery (CSRF) attacks, WordPress has two functions for plugin developers: wp_verify_nonce and check_ajax_referer. If you don’t use at least one of these functions, your plugin could…
It’s not enough to have ChatGPT do everything for you, but now people download Chrome extensions to help them manage ChatGPT. Several Chrome extensions used to manage ChatGPT like mass…
The WordPress API has a huge learning curve, so you might miss authentication and authorization checks when you code your first plugin. This article will explain how an authentication failure…
As big tech continues to push AI onto the masses, AI is a great new way for hackers to gain access to sensitive information. Microsoft just patched an AI security…
The WordPress plugin All-In-One Sticky Floating Contact Form was found to have a vulnerability involving authorization bypasses. When you develop plugins for WordPress, it’s important to ensure that the user…
As a home owner, you rely on your security cameras for home protection. Modern CCTV systems have an LCD panel in your house, but you can also connect to the…
