Articles by Tag #owasp

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Segurança no Front-end: dos ataques à prevenção

Se você ainda acha que segurança na web é responsabilidade exclusiva do back-end ou do time de...

Learn More 39 4Jun 16

Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

Pensando em segurança no desenvolvimento de software, onde geralmente a incluímos? Como pessoa...

Learn More 7 0May 20

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

If you've ever read the OWASP Top 10, you already know the most common web vulnerabilities—like SQL...

Learn More 7 1Jun 12

SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

Background In modern web environments, real-time visibility and automated responses are...

Learn More 5 0Jul 11

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

Only one section of the Mississippi River runs East to West. That stretch of the Big Muddy is home to...

Learn More 3 0Nov 4 '24

Broken Access Control in React: Fixes & Code Examples

Broken access control happens when users can reach pages, APIs, or data they’re not allowed to. In...

Learn More 3 0Sep 4

🛡️ OWASP Top 10 (2021 Edition) — Explained

# Name Description Example A01 Broken Access Control Users can access resources or perform...

Learn More 3 0Jul 1

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

Hey there, fellow developers! 👋 We all know security isn't just a "DevOps thing" or a "security team...

Learn More 2 0Oct 9

🔐 OWASP API Security — Why Every Developer Should Care (Java + AWS Context)

🌍 Summary APIs are everywhere — they power mobile apps, web services, and cloud-native...

Learn More 2 0Sep 20

OWASP Dependency Check

OWASP Dependency Check on Azure DevOps Atahan C. ・ Jan...

Learn More 1 0Feb 5

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Paris is one of the most bustling metropolises on earth, with millions of locals going about their...

Learn More 1 0Sep 30

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

Denver, Colorado, is home to vast mountain views of the easternmost section of the Southern Rocky...

Learn More 1 0Apr 3

Simple Root Detection: Implementation and verification

Read on Medium

Learn More 1 0May 8

OWASP Top 10 For Flutter - M1: Mastering Credential Security

New series of articles covering OWASP Top 10 For Flutter by Majid Hajian Azure & AI advocate...

Learn More 1 0Mar 12

The logic of Value

Not all threats matters equally, and not all vulnerabilities hold the same relevance, unless analyzed...

Learn More 0 0Mar 24

OWASP Top 10–2021 | TryHackMe Write-up

Here is my article on the walkthrough of free room for TryHackMe: OWASP TOP 10 - 2021, which is the...

Learn More 0 0Aug 21

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

In the world of AI, Large Language Models (LLMs) like GPT-4 and (o) are becoming increasingly...

Learn More 0 0Feb 21

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

What is Kubernetes? As open-source software, Kubernetes gives a platform to orchestrate...

Learn More 0 0Dec 26 '24

Access Control Security: Learning from Major Data Breaches

Learn from Twitter, LastPass, and Uber data breaches with practical access control security examples....

Learn More 0 0Jan 1

Offensive security - Testing for Broken Access Control (OWASP)

Hands-on at tryhackme room #1.. I used dirb on CLI to brute-force hidden directories on a...

Learn More 0 0Aug 4

OWASP Dependency Check on Azure DevOps

I will start this blog post with what is OWASP? And I will continue with OWASP Top 10 known security...

Learn More 0 0Jan 27

Web App Security in 2025: Defending Against AI-Driven Attacks

How we stopped a zero-day LLM injection attack—and what’s coming next ...

Learn More 0 0Jul 15

Simple Root Detection: Implementation and verification

Read on Medium

Learn More 0 0May 8

OWASP Top Ten 2021 explained with simple Java examples and SAST insights

In this article, we talk about the OWASP Top Ten 2021 categories through the lens of PVS-Studio Java...

Learn More 0 0Sep 23

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

The Open Worldwide Application Security Project, OWASP, has just released its Top 10 Non-Human...

Learn More 0 0Jan 22

OWASP Broken Access Control Vulnerabilities

When it comes to web application security, Broken Access Control stands out as one of the most...

Learn More 0 0Oct 17 '24

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

So a disclaimer. As a software engineer, I'm not a security expert. I rely heavily on those who know...

Learn More 0 2Nov 23 '24