Continuing our series on OWASP's top vulnerabilities; today we dive into vulnerability #7, Identification and Authentication Failures.
9 posts tagged with "macOS"
View All TagsOWASP Top 8 Software and Data Integrity Failures
For this week's educational blog we're diving into Software and Data Integrity Failures, OWASP's #8 and into the Event-Stream NPM Attack in 2018. This one is particularly close to us here at Protean since we were founded with the goal to protect our customers from these types of attacks!
OWASP Top 10's #9 Security Vulnerability - Equifax Data Breach 2017
Today we dive into Logging and Monitoring Failures, OWASP Top Ten's #9 and explore the Equifax Data Breach in 2017.
OWASP Top 10 Security Vulnerabilities - Capital One 2019
A perfect example of why Server Side Request Forgery (SSRF) vulnerabilities are on the OWASP Top 10 list.
The Importance of Zero Trust Architecture in Modern Cyber Security
"Never trust, always verify."
Security Breach Spotlight: Pycrypto and Pycryptodome
First installment of the Security Breach Spotlight, pycrypto and it's branch pycryptodome and the vulnerability that impacted them.
Preventing Cybercrime in Software Development 101
The annual average cost of cybercrime is predicted to hit more than $23 trillion in 2027.
How to send a file with curl
How to send files with curl using either HTTP via -F, or FTP/SMTP via -T
How to update your Python libraries
Quick tutorial on how to update your Python libraries