Tag: OWASP Top 10

ResilientX Security - Owasp top 10

OWASP Top 10 API Security Risks – 2023

The Open Web Application Security Project (OWASP) has been at the forefront of promoting security best practices and providing valuable resources for developers, designers, architects, managers, and organizations. The OWASP API Security Top 10

ResilientX Security - Broken Function Level Authorization

OWASP Top 10 API Security: Broken Function Level Authorization

APIs (Application Programming Interfaces) play a crucial role in modern application development, allowing different software systems to communicate and exchange data. However, APIs can introduce security vulnerabilities if not implemented and secured properly. One

ResilientX Security - OWASP Top 10 API Security: Unrestricted Resource Consumption

OWASP Top 10 API Security: Unrestricted Resource Consumption

Introduction to Unrestricted Resource Consumption In the digital age, APIs (Application Programming Interfaces) play a crucial role in enabling communication and data exchange between different software systems. However, with the increasing reliance on APIs,

ResilientX Security - Broken Object Level Authorization

OWASP Top 10 API Security: Broken Object Property Level Authorization

Introduction APIs are essential for enabling communication and data exchange between different systems. However, the security of APIs is crucial to prevent unauthorized access and data breaches. One vulnerability that poses a significant risk

ResilientX Security - OWASP TOP 10 API SECURITY - Broken Authentication

OWASP Top 10 API Security: Broken Authentication

In this technical article, we will explore the threat agents, attack vectors, security weaknesses, and impacts associated with API2:2023 broken authentication. We will also discuss examples of attack scenarios and provide preventive measures to

ResilientX Security - Broken Object Level Authorization

OWASP Top 10 API Security: Broken Object Level Authorization

In the ever-evolving landscape of API security, organizations must be vigilant in identifying and addressing potential vulnerabilities. One significant risk that developers and maintainers should be aware of is broken object-level authorization, denoted as