Number two on the OWASP top 10 is Broken Authentication, and while I want to make sure these explanatory guides are as in-depth and detailed as possible, this one is going to be a little shorter. This is because broken authentication is a vulnerability that most people who know computers sort of understand instinctually. As … Continue reading OWASP Top 10 #2: Broken Authentication
Category: Guides
INJECTION ATTACKS
The first item on the OWASP Top 10 list are injection attacks. There is a good reason this is number 1: injection attacks are the granddaddy of online hacks. They've been used consistently since the early days of the Internet and have been a constant presence since the world began moving to the internet. And … Continue reading INJECTION ATTACKS
OWASP Top 10
In this first series, we are going to explore the OWASP Top 10, one of the most important resources for developers and cybersecurity practitioners alike. The Open Web Application Security Project (OWASP) is a nonprofit that produces resources to help make a more secure internet. It's most popular resource is their list of top 10 … Continue reading OWASP Top 10
