OWASP Top 7 Identification and Authentication Failures
Continuing our series on OWASP's top vulnerabilities; today we dive into vulnerability #7, Identification and Authentication Failures.
Continuing our series on OWASP's top vulnerabilities; today we dive into vulnerability #7, Identification and Authentication Failures.
For this week's educational blog we're diving into Software and Data Integrity Failures, OWASP's #8 and into the Event-Stream NPM Attack in 2018. This one is particularly close to us here at Protean since we were founded with the goal to protect our customers from these types of attacks!
Today we dive into Logging and Monitoring Failures, OWASP Top Ten's #9 and explore the Equifax Data Breach in 2017.
A perfect example of why Server Side Request Forgery (SSRF) vulnerabilities are on the OWASP Top 10 list.
"Never trust, always verify."
First installment of the Security Breach Spotlight, pycrypto and it's branch pycryptodome and the vulnerability that impacted them.
Quick tutorial on how to update your Python libraries
An often overlooked step that could cost you!