Forem

# owasp

Discussions related to the OWASP Foundation, its projects, and Top 10 lists.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒
Cover image for Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

7
Comments 3
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐
Cover image for Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**
Cover image for **Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

3
Comments 4
2 min read
Introduction to OWASP
Cover image for Introduction to OWASP

Introduction to OWASP

8
Comments
2 min read
Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐
Cover image for Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐

Leveraging Advanced WAF Solutions for Business Security with OpenAppSec 🌐

1
Comments
2 min read
OWASP Top 10 for LLMs
Cover image for OWASP Top 10 for LLMs

OWASP Top 10 for LLMs

Comments
1 min read
Techno Security & Digital Forensics Conference East 2023
Cover image for Techno Security & Digital Forensics Conference East 2023

Techno Security & Digital Forensics Conference East 2023

4
Comments
10 min read
AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

AWS Lambda Cookbook — Elevate your handler’s code — Part 5— Input Validation

4
Comments
9 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

Explicando o TOP 2 da OWASP "Falhas Criptográficas" para desenvolvedores

10
Comments
5 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

2
Comments
4 min read
How to Automate OWASP ZAP
Cover image for How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
OWASP TOP 10 - SSRF
Cover image for OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Making Security Fun for Developers
Cover image for Making Security Fun for Developers

Making Security Fun for Developers

6
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Don't let your users get pwned via email HTML injection
Cover image for Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
API10:2019 - Insufficient Logging & Monitoring
Cover image for API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Basic Recon Automation Using Github Actions

Basic Recon Automation Using Github Actions

7
Comments
7 min read
Automação básica de Recon utilizando o Github Actions

Automação básica de Recon utilizando o Github Actions

5
Comments
8 min read
API9:2019 - Improper Assets Management
Cover image for API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
Use ZAP to Perform DAST (Dynamic Application Security Testing)

Use ZAP to Perform DAST (Dynamic Application Security Testing)

8
Comments 1
5 min read
6 DAST Tools Designed to Protect Against the OWASP Top 10
Cover image for 6 DAST Tools Designed to Protect Against the OWASP Top 10

6 DAST Tools Designed to Protect Against the OWASP Top 10

4
Comments
5 min read
API3:2019 - Excessive Data Exposure
Cover image for API3:2019 - Excessive Data Exposure

API3:2019 - Excessive Data Exposure

3
Comments
4 min read
API1:2019 - Broken Object Level Authorization

API1:2019 - Broken Object Level Authorization

4
Comments
2 min read
Why do we need all of this data? OWASP Privacy Risks - P-10
Cover image for Why do we need all of this data? OWASP Privacy Risks - P-10

Why do we need all of this data? OWASP Privacy Risks - P-10

3
Comments
2 min read
loading...