A web browser attack targets vulnerabilities in web browsers to compromise user data. These attacks often involve injecting malicious code… Read More
The OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks.… Read More
Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently… Read More
Broken function-level authorization vulnerabilities enable unauthorized users to access or execute functions they should not have access to. Read More
Excessive data exposure occurs when APIs reveal more fields, data, and information than the client requires through the API response. Read More
Check out the API Penetration Testing checklist, which outlines how to conduct an effective API security assessment for your organization. Read More
In this session, Puneet Miglani (Founder – Candor Technology) discusses with Venky how app development companies are emphasizing security in… Read More
Sunil Agrawal (CISO, Glean) shared his experience on the sub-domain takeover and how it led him to build foundationally secured… Read More
In this episode of SaaSTrana, Venky and Raghu, Co-Founder of Sprinto, discusses why SaaS companies should pay close attention to… Read More
Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When the app/… Read More
Cybersecurity threats are evolving rapidly, and CISOs must be ready to face the challenge. Be prepared for the top trends… Read More
Are you leaving your APIs vulnerable to attacks? OWASP revealed that Broken Object Level Authorization is among the top 10… Read More
Cyber insurance is an enabler for enterprise contracts. Founder of Marmin.AI shares how having a strong AppSec process, including VAPT… Read More
Kashish, CTO at Draup, talks about how he looks at vulnerability assessment, penetration testing, and application security. What drives Draup… Read More
Holidays are around the corner, and so are the hackers. Have you taken any steps to protect your business? Here… Read More
Cybersecurity compliance should be your first step to implementing the right security technologies. Here is an in-depth guide outlining cybersecurity… Read More
DDoS attacks are among the most rapidly advancing type of cybercrime. Traditional DDoS mitigation is not enough to counter these… Read More
How to secure your API endpoint? API scanning can help you secure endpoints. It also optimizes it for better reliability… Read More