Forem

# owasp

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

5
Comments
3 min read
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

5
Comments
2 min read
How Hackers Attack Web Apps — and How You Can Stop Them
Cover image for How Hackers Attack Web Apps — and How You Can Stop Them

How Hackers Attack Web Apps — and How You Can Stop Them

Comments
3 min read
🛡️ OWASP Top 10 (2021 Edition) — Explained
Cover image for 🛡️ OWASP Top 10 (2021 Edition) — Explained

🛡️ OWASP Top 10 (2021 Edition) — Explained

3
Comments
1 min read
Segurança no Front-end: dos ataques à prevenção
Cover image for Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

39
Comments 4
7 min read
Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

7
Comments
2 min read
The logic of Value
Cover image for The logic of Value

The logic of Value

Comments
3 min read
OWASP Top 10 For Flutter - M1: Mastering Credential Security
Cover image for OWASP Top 10 For Flutter - M1: Mastering Credential Security

OWASP Top 10 For Flutter - M1: Mastering Credential Security

1
Comments
1 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots
Cover image for SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Comments
3 min read
Access Control Security: Learning from Major Data Breaches
Cover image for Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

Comments
7 min read
OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know
Cover image for OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Comments
11 min read
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Comments 2
6 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Cover image for OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
OWASP Broken Access Control Vulnerabilities
Cover image for OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker
Cover image for Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

12
Comments
11 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Cover image for OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
API Security: Threats, Tools, and Best Practices
Cover image for API Security: Threats, Tools, and Best Practices

API Security: Threats, Tools, and Best Practices

5
Comments
1 min read
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Comments
2 min read
Ethical Hacking - This article is about discovering vulnerabilities in web applications.

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

6
Comments
11 min read
How to Explore an Exposed .git
Cover image for How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
🛡️🌐OWASP - Open Web Application Security Project
Cover image for 🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices
Cover image for Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
Compreendendo o SAMM
Cover image for Compreendendo o SAMM

Compreendendo o SAMM

1
Comments
6 min read
loading...