Articles by Tag #owasp

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

OWASP® Cornucopia 2.0

I started out as a web designer 16 years ago and my first website got brutally hacked, not...

Learn More 25 1Jun 10 '24

SAST Scanning with SonarQube and Docker

Learn how to set up and use SonarQube for Static Application Security Testing (SAST) with Docker.

Learn More 11 0Jun 4 '24

Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

Scanning Localhost Application with Docker ZAP Table of Contents Scanning...

Learn More 10 0Oct 15 '24

How to Explore an Exposed .git

What is git? Git is an open-source, distributed version control system (DVCS) that allows...

Learn More 6 1Aug 23 '24

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

We will use a range of tools to discover application failures. Github :...

Learn More 6 0Sep 9 '24

Be a Part of OWASP Top 10 2024!

The OWASP Top 10 is a collection of the most common application security risks, based around...

Learn More 5 3Jun 5 '24

API Security: Threats, Tools, and Best Practices

What Is API Security? API security refers to the practices and protocols that are used to...

Learn More 5 0Oct 13 '24

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

Only one section of the Mississippi River runs East to West. That stretch of the Big Muddy is home to...

Learn More 3 0Nov 4 '24

Compreendendo o SAMM

Quem trabalha com desenvolvimento de aplicações ou segurança cibernética possivelmente já ouviu falar...

Learn More 1 0Jul 12 '24

OWASP Top 10 For Flutter - M1: Mastering Credential Security

New series of articles covering OWASP Top 10 For Flutter by Majid Hajian Azure & AI advocate...

Learn More 1 0Mar 12

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

On the eastern shores of San Francisco, you will find The Embarcadero. Embarcadero, *which means...

Learn More 1 0Oct 15 '24

Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

Modsecurity with rule from OWASP rule set, make security very strict, sometimes modsecurity flag...

Learn More 1 0May 28 '24

OWASP Dependency Check

OWASP Dependency Check on Azure DevOps Atahan C. ・ Jan...

Learn More 1 0Feb 5

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

Denver, Colorado, is home to vast mountain views of the easternmost section of the Southern Rocky...

Learn More 1 0Apr 3

🛡️🌐OWASP - Open Web Application Security Project

Welcome to our post on OWASP (Open Web Application Security Project)! In this article, we will...

Learn More 0 0Aug 2 '24

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

The Open Worldwide Application Security Project, OWASP, has just released its Top 10 Non-Human...

Learn More 0 0Jan 22

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

So a disclaimer. As a software engineer, I'm not a security expert. I rely heavily on those who know...

Learn More 0 2Nov 23 '24

Create your own card game with OWASP® Cornucopia

As you might now, we recently released OWASP® Cornucopia 2.0 with two new editions, but did...

Learn More 0 2Jun 17 '24

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

In the world of AI, Large Language Models (LLMs) like GPT-4 and (o) are becoming increasingly...

Learn More 0 0Feb 21

Access Control Security: Learning from Major Data Breaches

Learn from Twitter, LastPass, and Uber data breaches with practical access control security examples....

Learn More 0 0Jan 1

The logic of Value

Not all threats matters equally, and not all vulnerabilities hold the same relevance, unless analyzed...

Learn More 0 0Mar 24

Top 10 OWASP Vulnerabilities: What Every Developer Should Know!

In the rapidly evolving landscape of web development, security is paramount. The Open Web...

Learn More 0 0Sep 23 '24

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Security is a major threat to companies striving to deliver software quickly. Alongside existing...

Learn More 0 0Jun 11 '24

OWASP Dependency Check on Azure DevOps

I will start this blog post with what is OWASP? And I will continue with OWASP Top 10 known security...

Learn More 0 0Jan 27

WEB API VULNERABILITY THROUGH OTP

Broken Authentication is a popular part of OWASP TOP 10 list. Authentication is one of the most...

Learn More 0 0May 8 '24

Open Web Application Security Project OWASP Top Ten

Web security is crucial for protecting applications and data from various threats. The OWASP (Open...

Learn More 0 0Jun 16 '24

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

We often see meaningful data when we work on web development, like credentials as key-value pairs of...

Learn More 0 0Sep 25 '24

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

What is Kubernetes? As open-source software, Kubernetes gives a platform to orchestrate...

Learn More 0 0Dec 26 '24

OWASP Broken Access Control Vulnerabilities

When it comes to web application security, Broken Access Control stands out as one of the most...

Learn More 0 0Oct 17 '24