DEV Community

# owasp

Discussions related to the OWASP Foundation, its projects, and Top 10 lists.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Advent of Cyber 2025: Day 5 IDOR this IDOR that| TryHackMe

Advent of Cyber 2025: Day 5 IDOR this IDOR that| TryHackMe

1
Comments
6 min read
OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

OWASP Top Ten 2025 Quiz 2 Week 1 (51 Questions)

Comments
51 min read
OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

OWASP Top 10 2025 Quiz: Week 1 (51 Questions)

Comments
25 min read
MVP Conf 2025 - OWASP API Security Top 10

MVP Conf 2025 - OWASP API Security Top 10

Comments
3 min read
Why You Should Use 310,000+ Iterations with PBKDF2 in 2025

Why You Should Use 310,000+ Iterations with PBKDF2 in 2025

4
Comments
3 min read
What We Learned from Subjecting LikhaERP to Independent VAPT Testing

What We Learned from Subjecting LikhaERP to Independent VAPT Testing

Comments 1
3 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

1
Comments
2 min read
5 Common Security Mistakes Developers Still Make (and How to Fix Them)

5 Common Security Mistakes Developers Still Make (and How to Fix Them)

2
Comments
5 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

3
Comments
9 min read
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Comments
7 min read
OWASP Top Ten 2021 explained with simple Java examples and SAST insights

OWASP Top Ten 2021 explained with simple Java examples and SAST insights

5
Comments
15 min read
🔐 OWASP API Security — Why Every Developer Should Care (Java + AWS Context)

🔐 OWASP API Security — Why Every Developer Should Care (Java + AWS Context)

Comments
14 min read
Offensive security - Testing for Broken Access Control (OWASP)

Offensive security - Testing for Broken Access Control (OWASP)

Comments
1 min read
SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

SafeLine WAF Automation: Real-World Security Ops Example (Case 1)

5
Comments
3 min read
🛡️ OWASP Top 10 (2021 Edition) — Explained

🛡️ OWASP Top 10 (2021 Edition) — Explained

3
Comments
1 min read
OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

7
Comments 1
2 min read
Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

39
Comments 4
7 min read
Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

7
Comments
2 min read
The logic of Value

The logic of Value

Comments
3 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

Comments
3 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

OWASP Kubernetes Top 10 Explained: Know About Risks & Mitigation

Comments
7 min read
OWASP Dependency Check on Azure DevOps

OWASP Dependency Check on Azure DevOps

Comments
4 min read
OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Comments
11 min read
loading...