OWASP API Top 10

What’s New in OWASP API Top 10 2023: The Latest Changes and Enhancements

What’s New in OWASP API Top 10 2023: The Latest Changes and Enhancements

The OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks.… Read More

11 months ago

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently… Read More

12 months ago

API5:2019 Broken Function Level Authorization: The What, Impact, Sample Exploit, and Prevention Methods

Broken function-level authorization vulnerabilities enable unauthorized users to access or execute functions they should not have access to. Read More

12 months ago

API3:2019 Excessive Data Exposure: Understanding the Risks, Impacts, and How to Prevent It

Excessive data exposure occurs when APIs reveal more fields, data, and information than the client requires through the API response. Read More

1 year ago

API4:2019 – Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods

Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When the app/… Read More

1 year ago

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive… Read More

1 year ago

OWASP API1: 2019 – Broken Object Level Authorization

Are you leaving your APIs vulnerable to attacks? OWASP revealed that Broken Object Level Authorization is among the top 10… Read More

1 year ago

Critical OWASP Top 10 API Security Threats

API security involves understanding the different threats that can harm your API. Read on for the Critical OWASP Top 10… Read More

2 years ago