Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
I started out as a web designer 16 years ago and my first website got brutally hacked, not...
Learn how to set up and use SonarQube for Static Application Security Testing (SAST) with Docker.
Scanning Localhost Application with Docker ZAP Table of Contents Scanning...
What is git? Git is an open-source, distributed version control system (DVCS) that allows...
We will use a range of tools to discover application failures. Github :...
The OWASP Top 10 is a collection of the most common application security risks, based around...
What Is API Security? API security refers to the practices and protocols that are used to...
Only one section of the Mississippi River runs East to West. That stretch of the Big Muddy is home to...
Quem trabalha com desenvolvimento de aplicações ou segurança cibernética possivelmente já ouviu falar...
New series of articles covering OWASP Top 10 For Flutter by Majid Hajian Azure & AI advocate...
On the eastern shores of San Francisco, you will find The Embarcadero. Embarcadero, *which means...
Modsecurity with rule from OWASP rule set, make security very strict, sometimes modsecurity flag...
OWASP Dependency Check on Azure DevOps Atahan C. ・ Jan...
Denver, Colorado, is home to vast mountain views of the easternmost section of the Southern Rocky...
Welcome to our post on OWASP (Open Web Application Security Project)! In this article, we will...
The Open Worldwide Application Security Project, OWASP, has just released its Top 10 Non-Human...
So a disclaimer. As a software engineer, I'm not a security expert. I rely heavily on those who know...
As you might now, we recently released OWASP® Cornucopia 2.0 with two new editions, but did...
In the world of AI, Large Language Models (LLMs) like GPT-4 and (o) are becoming increasingly...
Learn from Twitter, LastPass, and Uber data breaches with practical access control security examples....
Not all threats matters equally, and not all vulnerabilities hold the same relevance, unless analyzed...
In the rapidly evolving landscape of web development, security is paramount. The Open Web...
Security is a major threat to companies striving to deliver software quickly. Alongside existing...
I will start this blog post with what is OWASP? And I will continue with OWASP Top 10 known security...
Broken Authentication is a popular part of OWASP TOP 10 list. Authentication is one of the most...
Web security is crucial for protecting applications and data from various threats. The OWASP (Open...
We often see meaningful data when we work on web development, like credentials as key-value pairs of...
What is Kubernetes? As open-source software, Kubernetes gives a platform to orchestrate...
When it comes to web application security, Broken Access Control stands out as one of the most...