Forem

# owasp

Discussions related to the OWASP Foundation, its projects, and Top 10 lists.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HackTheBox - Writeup Drive [Retired]

HackTheBox - Writeup Drive [Retired]

Comments 1
15 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨
Cover image for OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)
Cover image for OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔
Cover image for OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

4
Comments
3 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔
Cover image for OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

7
Comments
4 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨
Cover image for OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️
Cover image for OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔
Cover image for OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

5
Comments
5 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒
Cover image for Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

7
Comments 3
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐
Cover image for Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**
Cover image for **Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

3
Comments 4
2 min read
Introduction to OWASP
Cover image for Introduction to OWASP

Introduction to OWASP

8
Comments
2 min read
Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐
Cover image for Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐

Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐

1
Comments
2 min read
OWASP Top 10 for LLMs
Cover image for OWASP Top 10 for LLMs

OWASP Top 10 for LLMs

Comments
1 min read
Techno Security & Digital Forensics Conference East 2023
Cover image for Techno Security & Digital Forensics Conference East 2023

Techno Security & Digital Forensics Conference East 2023

4
Comments
10 min read
AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

4
Comments
9 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

10
Comments
5 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

2
Comments
4 min read
How to Automate OWASP ZAP
Cover image for How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
OWASP TOP 10 - SSRF
Cover image for OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Making Security Fun for Developers
Cover image for Making Security Fun for Developers

Making Security Fun for Developers

6
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Don't let your users get pwned via email HTML injection
Cover image for Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
API10:2019 - Insufficient Logging & Monitoring
Cover image for API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
loading...