OWASP Top 10

Understanding Serialization Attacks: Risks, Examples, and Prevention

Understanding Serialization Attacks: Risks, Examples, and Prevention

A serialization attack exploits vulnerabilities in serialization processes to manipulate data or gain unauthorized access, posing significant security risks. Read More

1 month ago

OWASP Top 10 for LLM Applications – Critical Vulnerabilities and Risk Mitigation

Explore OWASP Top 10 for LLMs, identifying risks like prompt injection, data poisoning, and model theft. Dive into each risk… Read More

2 months ago

OWASP Top 10 Vulnerabilities in 2021: How to Mitigate Them?

Read on to find out the OWASP Top 10 vulnerabilities 2021 explained in detail, along with ways to mitigate each. Read More

2 years ago

Top 10 Tips to Protect Against OWASP Top 10 Vulnerabilities

Foster a culture of secure development and usage of web applications by protecting your business against OWASP Top 10 vulnerabilities. Read More

3 years ago

OWASP Top 10 Web Application Security Risks and Vulnerabilities to Watch Out for in 2020

Discover the OWASP Top 10 Web Application Security Risks of 2020. Learn about critical vulnerabilities that can impact your website's… Read More

4 years ago

How to Prevent XML External Entities?

Custom-defined XML entities that are loaded externally and parsed by weak XML parsers, XXE vulnerabilities as they are better known,… Read More

4 years ago

OWASP Mitigation Techniques

OWASP Top 10 seeks to create a more secure software development culture and improved web application security. It gives a… Read More

4 years ago

OWASP Top 10 Vulnerabilities

The first part of OWASP Top 10 series on web and mobile applications. It explains how OWASP 10 vulnerabilities help… Read More

5 years ago

What Type of Vulnerabilities Does A Penetration Test Look For?

Pen testing enables organizations to understand their security health and the performance of their web applications and the different security… Read More

5 years ago

35 Security Stats Businesses Should Not Miss

Did you know that 155 .GOV and .NIC domains were hacked last year? Learn about more of such facts and… Read More

8 years ago

Sensitive Data Exposure – A Nightmare To All Business Enterprises

Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes using… Read More

10 years ago

What is Broken Authentication & How to Prevent it?

To prevent Broken Authentication vulnerability, use strong password policies, implement multi-factor authentication, and regularly monitor user activity. Read More

10 years ago

OWASP Top 10 Vulnerabilities 2013

By Client Services Team, Indusface (more…) "OWASP Top 10 Vulnerabilities 2013" Read More

10 years ago