Forem

# owasp

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

5
Comments
2 min read
Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

1
Comments 1
7 min read
Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

8
Comments
2 min read
The logic of Value

The logic of Value

Comments
3 min read
OWASP Top 10 For Flutter - M1: Mastering Credential Security

OWASP Top 10 For Flutter - M1: Mastering Credential Security

1
Comments
1 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Comments
3 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

Comments
7 min read
OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Comments
11 min read
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Comments 2
6 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

10
Comments
11 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
API Security: Threats, Tools, and Best Practices

API Security: Threats, Tools, and Best Practices

5
Comments
1 min read
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Comments
2 min read
Ethical Hacking - This article is about discovering vulnerabilities in web applications.

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

6
Comments
11 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
Compreendendo o SAMM

Compreendendo o SAMM

1
Comments
6 min read
Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

Comments
3 min read
OWASP® Cornucopia 2.0

OWASP® Cornucopia 2.0

25
Comments 1
6 min read
WEB API VULNERABILITY THROUGH OTP

WEB API VULNERABILITY THROUGH OTP

Comments
2 min read
loading...