Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
Se você ainda acha que segurança na web é responsabilidade exclusiva do back-end ou do time de...
Pensando em segurança no desenvolvimento de software, onde geralmente a incluímos? Como pessoa...
If you've ever read the OWASP Top 10, you already know the most common web vulnerabilities—like SQL...
Background In modern web environments, real-time visibility and automated responses are...
Only one section of the Mississippi River runs East to West. That stretch of the Big Muddy is home to...
Broken access control happens when users can reach pages, APIs, or data they’re not allowed to. In...
# Name Description Example A01 Broken Access Control Users can access resources or perform...
Hey there, fellow developers! 👋 We all know security isn't just a "DevOps thing" or a "security team...
🌍 Summary APIs are everywhere — they power mobile apps, web services, and cloud-native...
OWASP Dependency Check on Azure DevOps Atahan C. ・ Jan...
Paris is one of the most bustling metropolises on earth, with millions of locals going about their...
Denver, Colorado, is home to vast mountain views of the easternmost section of the Southern Rocky...
Read on Medium
New series of articles covering OWASP Top 10 For Flutter by Majid Hajian Azure & AI advocate...
Not all threats matters equally, and not all vulnerabilities hold the same relevance, unless analyzed...
Here is my article on the walkthrough of free room for TryHackMe: OWASP TOP 10 - 2021, which is the...
In the world of AI, Large Language Models (LLMs) like GPT-4 and (o) are becoming increasingly...
What is Kubernetes? As open-source software, Kubernetes gives a platform to orchestrate...
Learn from Twitter, LastPass, and Uber data breaches with practical access control security examples....
Hands-on at tryhackme room #1.. I used dirb on CLI to brute-force hidden directories on a...
I will start this blog post with what is OWASP? And I will continue with OWASP Top 10 known security...
How we stopped a zero-day LLM injection attack—and what’s coming next ...
Read on Medium
In this article, we talk about the OWASP Top Ten 2021 categories through the lens of PVS-Studio Java...
The Open Worldwide Application Security Project, OWASP, has just released its Top 10 Non-Human...
When it comes to web application security, Broken Access Control stands out as one of the most...
So a disclaimer. As a software engineer, I'm not a security expert. I rely heavily on those who know...