Continuing our series on OWASP's top vulnerabilities; today we dive into vulnerability #7, Identification and Authentication Failures.
OWASP Top 7 Identification and Authentication Failures
· 3 min read
Continuing our series on OWASP's top vulnerabilities; today we dive into vulnerability #7, Identification and Authentication Failures.
For this week's educational blog we're diving into Software and Data Integrity Failures, OWASP's #8 and into the Event-Stream NPM Attack in 2018. This one is particularly close to us here at Protean since we were founded with the goal to protect our customers from these types of attacks!
Today we dive into Logging and Monitoring Failures, OWASP Top Ten's #9 and explore the Equifax Data Breach in 2017.
A perfect example of why Server Side Request Forgery (SSRF) vulnerabilities are on the OWASP Top 10 list.