DEV Community

# owasp

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The logic of Value

The logic of Value

Comments
3 min read
OWASP Top 10 For Flutter - M1: Mastering Credential Security

OWASP Top 10 For Flutter - M1: Mastering Credential Security

1
Comments
1 min read
Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Comments
3 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

Comments
7 min read
OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Comments
11 min read
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Comments 2
6 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

10
Comments
11 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
API Security: Threats, Tools, and Best Practices

API Security: Threats, Tools, and Best Practices

5
Comments
1 min read
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Comments
2 min read
Ethical Hacking - This article is about discovering vulnerabilities in web applications.

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

6
Comments
11 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

6
Comments 1
4 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
Compreendendo o SAMM

Compreendendo o SAMM

1
Comments
6 min read
Open Web Application Security Project OWASP Top Ten

Open Web Application Security Project OWASP Top Ten

Comments
3 min read
OWASP® Cornucopia 2.0

OWASP® Cornucopia 2.0

25
Comments 1
6 min read
WEB API VULNERABILITY THROUGH OTP

WEB API VULNERABILITY THROUGH OTP

Comments
2 min read
Create your own card game with OWASP® Cornucopia

Create your own card game with OWASP® Cornucopia

Comments 2
2 min read
Be a Part of OWASP Top 10 2024!

Be a Part of OWASP Top 10 2024!

5
Comments 3
4 min read
SAST Scanning with SonarQube and Docker

SAST Scanning with SonarQube and Docker

11
Comments
10 min read
Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

Whitelisting Specific Paths on Modsecurity 3 with OWASP Rules

1
Comments
1 min read
loading...