filmov
tv
API Security Top 10 Vulnerabilities
Показать описание
As software crafters, our responsibility spans more than just shipping working, maintainable software and automated tests. The applications we build must be secured, observable, and reliable. Tools can assist us up to a point, but from there on it's up to the design decisions we take to avoid common pitfalls as early as possible in the development cycle.
In this presentation, we will walk over the top 10 most common security vulnerabilities when developing REST APIs, similar to the classic OWASP Top 10 that many of you might be familiar with.
Vulnerabilities we'll discuss:
- Broken Object Level Authorization
- Broken User Authentication
- Excessive Data Exposure
- Lack of Resources & Rate Limiting
- Broken Function Level Authorization
- Mass Assignment
- Security Misconfiguration
- Injection
- Improper Assets Management
- Insufficient Logging & Monitoring
Let's hack our way to better software engineers together!
👩🏻💻👨💻
About the speaker:
In this presentation, we will walk over the top 10 most common security vulnerabilities when developing REST APIs, similar to the classic OWASP Top 10 that many of you might be familiar with.
Vulnerabilities we'll discuss:
- Broken Object Level Authorization
- Broken User Authentication
- Excessive Data Exposure
- Lack of Resources & Rate Limiting
- Broken Function Level Authorization
- Mass Assignment
- Security Misconfiguration
- Injection
- Improper Assets Management
- Insufficient Logging & Monitoring
Let's hack our way to better software engineers together!
👩🏻💻👨💻
About the speaker:
OWASP TOP 10 API Vulnerabilities Explained | Part One | TryHackMe
API Security Top 10 Vulnerabilities
Top 10 OWASP Vulnerabilities for API Security Explained! - API Cybersecurity 101
Understanding The Fundamentals of API Security | How APIs are Attacked and How to Secure Them
The Top 10 API Vulnerabilities
OWASP Top 10 API security vulnerabilities | API security risks
Analyzing The OWASP API Security Top 10 For Pen Testers
PYNT vs OWASP: Pynt Top 10 API Security Vulnerabilities Report
Find VULNERABILITIES in Web application with OWASP Tool
OWASP Top 10 API Vulnerabilities Explained | Part 3 | TryHackMe
OWASP best practices to protect your APIs from security vulnerabilities
My Favorite API Hacking Vulnerabilities & Tips
OWASP Top 10 API Vulnerabilities Explained | Part Four | TryHackMe
OWASP TOP 10 API Vulnerabilities Explained | Part Two | TryHackMe
Web App Vulnerabilities - DevSecOps Course for Beginners
How to protect your APIs against these 6 security threats
Combatting API Vulnerabilities with the 3 Pillars of API Security
The Latest API Security Vulnerabilities with Dmitry Sotnikov
5 Best Practices for Securing Your APIs
How to prevent OWASP API Top 10 security vulnerabilities? API attack prevention
OWASP Top 10 2021 - The List and How You Should Use It
A Hacker's Perspective on API Vulnerabilities
What Can Attackers Do With API Vulnerabilities - API Security With A Pinch Of Salt
c{api}tal - Exploit OWASP API's top 10 vulnerabilities (BlackHat EU 2022 - Arsenal)
Комментарии