In 2017, OWASP added a new vulnerability to the Top 10 list: A8 Insecure Deserialization, in place of the previous #8 vulnerability, Cross-Site Request Forgery. According to [...]
What is Access Control? Access control (authorization) determines which users can interact with what systems and resources within your company. When access control is broken, [...]
C# OWASP Top 10: How to Discover Vulnerabilities in a C# Web Application In this article, you’ll learn the top 10 security issues in web applications, as [...]
Many applications provide a services layer (to other applications, to a presentation layer, etc.). Or, they consume services exposed by third-parties (not necessarily trusted). A [...]
With regards to Software Security Weaknesses, hackers and burglars operate similarly. They are always looking for ways to get into secure places. For hackers, they [...]
Legacy “business-oriented” languages present unique challenges for software security. Unfortunately, there is a lack of awareness about the security risks of these languages. In this [...]
Cybersecurity Trends are a pressing topic in all companies regardless of the industry. It has become more important than ever to protect data from cyber [...]
The Common Weakness Enumeration Initiative The Common Weakness Enumeration (CWE) is an extension of the Common Vulnerabilities and Exposures (CVE) list compiled by MITRE, a [...]