DEV Community

# owasp

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

5
Comments
3 min read
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

5
Comments
2 min read
How Hackers Attack Web Apps — and How You Can Stop Them

How Hackers Attack Web Apps — and How You Can Stop Them

Comments
3 min read
🛡️ OWASP Top 10 (2021 Edition) — Explained

🛡️ OWASP Top 10 (2021 Edition) — Explained

3
Comments
1 min read
Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

39
Comments 4
7 min read
Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

7
Comments
2 min read
The logic of Value

The logic of Value

Comments
3 min read
OWASP Top 10 For Flutter - M1: Mastering Credential Security

OWASP Top 10 For Flutter - M1: Mastering Credential Security

1
Comments
1 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Comments
3 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

Comments
7 min read
OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Comments
11 min read
Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Understanding Sequelize's 'escape' function and why ideally we should avoid using it manually

Comments 2
6 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

Securing Your Web Applications (DAST): A Deep Dive into OWASP ZAP Scans with Docker

12
Comments
11 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
API Security: Threats, Tools, and Best Practices

API Security: Threats, Tools, and Best Practices

5
Comments
1 min read
Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Why not underestimate the 'loose ends': Bridging Web Development with Cybersecurity

Comments
2 min read
Ethical Hacking - This article is about discovering vulnerabilities in web applications.

Ethical Hacking - This article is about discovering vulnerabilities in web applications.

6
Comments
11 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

Comments
3 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
loading...