Explaining that Laravel Image File Upload Vulnerability...
[Tip#7] Always pass user input through a validator to ensure you only get the data you're expecting.
[Tip#1] - We're starting out with a simple but quite important tip, how to use a custom encryption key for encrypted casting within Models.
[InDepth#2] Let's dive into SQL Injection, learn how it works, and what we can do with it.
Let's dive into Escaping Output Safely in your Laravel apps. Learn about Cross-Site Scripting (XSS), how to handle unescaped output safely, and explore…
[InDepth#7] Content Security Policies are an incredibly powerful security feature built into the browser, and as it turns out, they are also pretty easy…
Laravel Security In Depth: Timing Attacks[InDepth#6] You can use response timing to infer important information... in this post we dive into timing attacks in Password Resets and more. 
[InDepth#8] Policy Objects are incredibly powerful. Use them.
[InDepth#4] Placeholders are incredibly useful, but you need to be careful with them. If a malicious user can guess a placeholder, they can manipulate…
Security Discussion: Is User Enumeration a Risk?User Enumeration is a commonly reported vulnerability where you can identify if a user has an account based on the response you get back from a User…
[Tip#17] It's easy to forget to update the admins list when it changes...
[Tip#15] Because we don't already have enough to worry about, without also needing to factor in other characters and emoji too...