Explore tweets tagged as #OWASPTop10
π¨ Insecure Design β A Silent Cyber Threat! π¨. Did you know that insecure design is one of the biggest reasons apps and systems get hacked? π΅οΈββοΈπ». #CyberSecurity #OWASP #InsecureDesign #AppSecurity #SecureByDesign. #a04 #cybersecurity #OWASPTOP10.
0
0
0
π Why BOLA Matters:.Imagine a digital bank where customers access transactions via ID. Without proper checks, attackers can view others' records by manipulating the ID. Protect your APIs! #APISecurity #OWASPTop10.
1
0
0
𧩠BOLA Simplified:.APIs rely on object IDs to fetch data. Without proper authorization checks, attackers can access other users' data. Always validate access at the object level. #OWASPTop10 #API1.
1
0
0
π¨ BOLA attacks happen when APIs trust user-provided IDs without verifying access. Implement Object Level Authorization checks for every data access request. #API1 #APISecurity #OWASPTop10.
1
0
0
Building #SafeEnterpriseAI starts here! Explore the #OWASPTop10 for #LLMs, crafted by experts to address critical #AI vulnerabilities and mitigation strategies. Download Infographic π #DataSecurity #LLMSecurity #OWASP #AISecurity #AIGovernance #Securiti
0
0
1
2025εΉ΄γWebγ’γγͺγ±γΌγ·γ§γ³γ»γγ₯γͺγγ£γ―倧δΊοΌ OWASP Top 10γ«θΏ½ε γγγLLMγͺγΉγ―γγγγ³γγγ€γ³γΈγ§γ―γ·γ§γ³ε―Ύηγγγ§γγ―οΌ SQLγ€γ³γΈγ§γ―γ·γ§γ³γXSSγζ°γγ€γγοΌ #WebSecurity #OWASPTop10.
0
0
0
A10:2021 β Server-Side Request Forgery (SSRF) π¨.SSRF allows attackers to make unauthorized requests from a vulnerable server, bypassing firewalls & accessing internal services. With cloud adoption, its impact is rising! π₯ #CyberSecurity #OWASPTop10.
0
0
0
Prevent Security Logging Failures! β
.πΉ Log all auth failures.πΉ Monitor API activity.πΉ Use append-only logs.πΉ Set up real-time alerts.πΉ Follow NIST 800-61r2 for incident response.Your security depends on it! #OWASPTop10 #CyberSecurity.
0
0
0
10+ Years of Data Gone! π³βοΈ.An airline lost customer credit card & passport data due to a breach at a third-party cloud provider. The problem? Inadequate monitoring. Donβt wait for disasterβsecure your logs! #DataPrivacy #OWASPTop10.
1
0
0
Attackers love weak monitoring! π―.If your app canβt detect & escalate active attacks, you're already compromised. Implement:.βοΈ Log integrity controls.βοΈ Real-time alerts.βοΈ Security event monitoring.#AppSec #Logging #OWASPTop10.
1
0
0
Security Logging & Monitoring Failures (A09:2021) ππ.Without proper logging & monitoring, breaches go undetected! Are your security alerts effective? #CyberSecurity #OWASPTop10 #infosec.
1
0
0
4οΈβ£ No CVEs? No Problem (for Hackers) π.Vulnerable Components donβt always have CVEs mapped, making them harder to track! Thatβs why OWASP assigns them a default exploit impact of 5.0 π¨.#SecurityAwareness #OWASPTop10.
1
0
0
6οΈβ£ How to Prevent Injection Attacks?.β
Use parameterized queries.β
Escape special characters in dynamic queries.β
Implement strict input validation.β
Use LIMIT to prevent mass data leaks.β
Leverage SAST, DAST & IAST in CI/CD pipelines.#CyberSecurityTips #OWASPTop10.
1
0
0
4οΈβ£ How Attackers Exploit Cryptographic Weaknesses π.π³ SQL injection bypasses encryption in databases.π‘ HTTP connections intercepted, session hijacked.π Hardcoded passwords lead to instant breaches.Secure your data! #CyberSecurity #OWASPTop10.
1
0
0
Cybersecurity News. So OWASP Top 10 for 2025 has been released. Here are the change. Stay Vigilant, Stay Secure!. Chilli. πΆοΈ. #ITSecurity #Infosec #Appsec #Cybersecurity #OWASP #OWASPTop10.
0
0
0
Understanding OWASP Top 10: A Comprehensive Guide to Web Application Security . read the complete article: #OWASPTOP10 #OWASP #webapplication #webapp #webappsecurity #websecurity.
0
0
2
How you can login with Admin account, in this video we explore the ways that it could be possible. OWASP Top 10 2021 : Web Fundamentals : TryHackMe : Data Integrity Failur. #owasptop10 #tryhackme #dataintegrity . via @YouTube
0
0
1
Check out My new Motion Graphics #Writeup on #Whiterose #TryHackMe, which is now live on #InfoSec #Community.Classic example of Server Side Template Injection #SSTI #Vulnerability. #CyberSec #CyberSecurityAwareness #CyberSecurity #TryHackMe #OwaspTop10 #Ethicalhacking #redteam.
π¨ New Writeup Alert! π¨. "Whiterose TryHackMe Motion Graphics Writeup | Easy Room | Detailed THM Walkthrough" by Sunny Singh Verma [ SuNnY ] is now live on IW!. Check it out here: #whiterosethmwirteup #tryhackme #ssti #tryhackmewalkthrough.
0
0
0
Owasp top 10-2021 in Tamil.πΊ Watch now: #WebHacking #WAPT #owasptop10 #WebFundamentals #CyberSecurity #TamilTutorial #TryHackMe #PenetrationTesting #CTF #CyberAdam #EthicalHacking #infosec #bugbounty #bugbountytips #informationsecurity #Tamiltech.
0
0
2