Curated Video
A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Curated Video
A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Curated Video
A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Curated Video
A Detailed Guide to the OWASP Top 10 - API Endpoints
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - Introduction to APIs
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Curated Video
A Detailed Guide to the OWASP Top 10 - Section Intro
In this video, we introduce the focus on OWASP's Top 10 API Security Risks for 2023, setting the stage for deep dives into each risk.
Curated Video
A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery Prevention
This video explains the prevention of Server-Side Request Forgery.
Curated Video
A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery
This video explains A10: 2021 - Server-Side Request Forgery (SSRF).
Curated Video
A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention
This video explains the steps to prevent security logging and monitoring failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures
This video explains OWASP 09 - security logging and monitoring failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - Software and Data Integrity Failures Prevention
This video explains how we can prevent software and data integrity failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #8 Software and Data Integrity Failures
This video explains A08: 2021 - software and data integrity failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention
This video explains how to prevent identification and authentication failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures
This video explains OWASP 07 - identification and authentication failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components Prevention
This video explains how to prevent vulnerable and outdated components from becoming an issue.
Curated Video
A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components
This video explains the A06: 2021 - vulnerable and outdated components.
Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration
This video explains the A05 - security misconfiguration using an attack scenario.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention
This video explains how to prevent insecure design when developing software.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design
This video explains the A04: 2021 - insecure design, which focuses on risks related to design and architectural flaws.
Curated Video
A Detailed Guide to the OWASP Top 10 - #3 Cross-Site Scripting Attacks
This video explains another important client-side based attack, which is called the cross-site scripting attack.
Curated Video
A Detailed Guide to the OWASP Top 10 - #3 SQL Injection Attacks
This video explains the most common type of attack on a website, which is the SQL injection attack.
Curated Video
A Detailed Guide to the OWASP Top 10 - Understanding SQL and Databases
This video explains databases and Structured Query Language (SQL).
Curated Video
A Detailed Guide to the OWASP Top 10 - Quick Notice
This video is a quick notice to SQL before diving into other attacks.