Venkat Rvenkatr.hashnode.dev·May 12, 2024Locking Down the Digital Gateway: A Deep Dive into API Security Best PracticesAPIs (Application Programming Interfaces) are the backbone of modern software, enabling communication between different applications and services. However, the ubiquity of APIs also makes them a prime target for attackers. This comprehensive guide wi...Secured APIs
Shay Randredmethod.hashnode.dev·Jul 3, 2022IDOR - Broken AuthenticationIDOR - Background Info In our first example, what's stopping someone from checking another user's ID and getting all their information? This code example demonstrates how this can occur. The server is taking in the user's id and directly displays...13 likes·2.4K readswebsecurity
Kaustubh Rairaikaustubh.com·Mar 9, 2021OWASP Top 🔟 2017Every cyber-security enthusiast has once come upon these terms OWASP Top 10. The Top 10 here means Top 10 Vulnerablities, the greatest software risks for any Web Application. OWASP is just an online community/non profit foundation that helps to impro...Postsdata exposure