2023 OWASP Top-10 Series: Introduction

| | owasp, OWASP Top 10
In early June 2023, OWASP released the final version of the OWASP API Security Top-10 list update. At that time we published a “hot take” on this final version and followed that ...
owasp top 10

OWASP Penetration Testing: Your Ultimate Guide!

The Open Web Application Security Project (OWASP) is an online community that was established on September 9, 2001, by Mark Curphey, a cybersecurity expert, with the objective of mitigating cyber attacks. OWASP ...
How does SQLi attack works

How to Prevent SQL Injection Attacks?

SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all about and how can you prevent SQL injection. The post How to ...

Octopus Strike! Three Argo CD API Exploits In Two Weeks

Argo CD is a popular Continuous Deployment tool that enables DevOps teams to manage their applications across multiple environments. However, in the past two weeks, three critical vulnerabilities have been detected in ...
API12019 Broken Object Level Authorization

OWASP API1: 2019 – Broken Object Level Authorization

Are you leaving your APIs vulnerable to attacks? OWASP revealed that Broken Object Level Authorization is among the top 10 most critical API security risks list The post OWASP API1: 2019 – ...
Gain Control of Rapidly Securing Your Critical APIs Without Worrying About Your Backend Stack

Gain Control of Rapidly Securing Your Critical APIs Without Worrying About Your Backend Stack

Imagine trying to protect your web application farm, while needing to integrate with all the different web servers’ backend stacks on a one-to-one basis. This requires a WAF that understands systems such ...

Out with the WAF, in with the WAAP

Advanced attacks call for advanced protection Bad actors are constantly discovering new attack vectors to exploit applications. To meet the threat, organizations need enterprise-level security more now than ever. Traditionally, implementing a ...

At Kong Summit 2022, Imperva Will Demonstrate how to Use Terraform to Onboard Kong-managed Apps and Discover API Endpoints

Imperva and Kong are working together to simplify APIs Imperva is attending Kong’s 2022 Summit on September 28 and 29 in San Francisco. Imperva’s Summit booth will feature both a recorded and ...

“Oops, I insecurely coded again!”

The call is coming from inside the house It’s no secret that companies need to be vigilant about application security. However, frequently the source of application vulnerabilities may come as a surprise ...