Cyber Seklercybersekler.com·Oct 27, 2023Broken Access Control Leading to Privilege EscalationBroken Access Control is the number one vulnerability on the OWASP top 10 list, and I understand why, almost every pentest I conduct I find an access control issue, some of them are low impact and some of them are higher impact. In this post, I am go...DiscussOWASP TOP 10
Darshan Patildarshan-ptl.hashnode.dev·Oct 5, 2023OWASP Top 10 for LLM ApplicationsDemystifying the OWASP Top 10: A Comprehensive Guide for LLM (Language Learning Models) The rush of interest in Large Language Models (LLMs) following the release of mass-market pre-trained chatbots in late 2022 has been astounding—businesses seeking...DiscussOWASP TOP 10
Joy Mukherjeecodegeeks.hashnode.dev·Oct 2, 20239 Common Security Vulnerabilities in Web ApplicationsWeb applications have become integral to our daily lives, facilitating everything from online shopping to social interactions. However, the increasing complexity of web apps also brings a higher risk of security vulnerabilities. Cyberattacks can resu...Discusswebsecurity
Utkarsh Mishraowasptopten.hashnode.dev·Sep 18, 2023📝Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks📝 Title: Unveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks Hey there, my fellow cybersecurity adventurer! I've just returned from an exhilarating expedition through the treacherous terrain of the OWASP Top 1...Discuss·27 reads#cybersecurity
muhammad zubairdev.muhammadzubair220.xyz·Aug 30, 2023🛡️ Exploring Essential DevSecOps Tools for Secure DevelopmentIn the rapidly evolving landscape of software development, ensuring security is no longer an afterthought; it's an integral part of the development process. DevSecOps, the fusion of development, security, and operations, emphasizes incorporating secu...DiscussDevSecOps
Kevin TauchmanforKevBot's Security Blogkevbotsec.hashnode.dev·Aug 25, 2023Demystifying OWASP Top 10Introduction In the ever-evolving landscape of web applications, security remains a paramount concern. As businesses and services migrate online, the potential attack surface for malicious actors also increases. The Open Web Application Security Proj...DiscussOWASP TOP 10
Prakhar Shankarprakharalsoblogs.hashnode.dev·Aug 24, 2023OWASP top 10Introduction OWASP stands for Open Web Application Security Project, it is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. The Top 10 OWASP v...DiscussOWASP TOP 10
muhammad zubairdev.muhammadzubair220.xyz·Aug 21, 2023🔒📚 Mastering DevSecOps: A Comprehensive Guide🌟 Welcome to our comprehensive guide on DevSecOps! In this blog, we'll delve into the key chapters of the course, breaking down the essential concepts and practices that form the foundation of DevSecOps. Let's dive right in and explore the fascinati...DiscussDevSecOps
Anusha Shanbhoganushaa.hashnode.dev·Jul 31, 2023Understanding API SecurityWhat is an API? An Application Programming Interface (API) allows software applications to interact with each other and plays a crucial role in modern software structures like microservices architectures. It defines the methods and data formats that...Discuss·3 likes·83 reads#cybersecurity
Timothy Akandesec-chronicles.hashnode.dev·Jul 26, 2023API kitchen: The recipe for API testing and hacking using OWASP top 10.Introduction An API is a set of rules that act as an intermediary between two applications, the API makes it easy for the applications to communicate with each other using a request and response. The API makes it easy for organizations to build ready...Discuss·1 like·62 readshacking