Secure your code, from the start.

Tag

application security training

Coders Conquer Security OWASP Top 10 API Series - Lack of Resources and Rate Limiting

30th September 2020

This vulnerability occurs when too many requests come in at the same time, and the API does not have enough computing resources to handle those requests. The API can then become unavailable or unresponsive to new requests.…

Coders Conquer Security OWASP Top 10 API Series - Broken Authentication

16th September 2020

Authentication often acts as a gateway to both an application and potentially to the rest of a network, so they are tempting targets for attackers. If an authentication process is broken or vulnerable, there is a good chance that attackers will discover that weakness and exploit it.…