Ebooks

Ebooks February 9th, 2023

Ebook – OWASP API9: Improper Asset Management

Ebooks

Ebook – OWASP API9: Improper Asset Management

Old API versions are usually unpatched, offering an easy way to compromise systems without […]

> Read More

Ebooks February 9th, 2023

Ebook – OWASP API8: Injection

Ebooks

Ebook – OWASP API8: Injection

Injection is at the heart of several vulnerabilities, including SQL injection, OS command injection, […]

> Read More

Ebooks February 9th, 2023

Ebook – OWASP API5: Broken Function-Level Authorization

Ebooks

Ebook – OWASP API5: Broken Function-Level Authorization

Broken function-level authorization occurs when applications fail to limit sensitive functions to the authorized […]

> Read More

Ebooks February 9th, 2023

Ebook – OWASP API4: Lack of Resources and Rate-Limiting

Ebooks

Ebook – OWASP API4: Lack of Resources and Rate-Limiting

API requests use network, CPU, memory, and storage resources. APIs usually have no restrictions […]

> Read More

Ebooks February 9th, 2023

Ebook – OWASP API3: Excessive Data Exposure

Ebooks

Ebook – OWASP API3: Excessive Data Exposure

Ban e-commerce app may include a product catalog with many product attributes. A client […]

> Read More

Ebooks February 9th, 2023

Ebook – OWASP API2: Broken User Authentication

Ebooks

Ebook – OWASP API2: Broken User Authentication

How Hackers Exploit It Broken User Authentication is the second security vulnerability in OWASP […]

> Read More

Just dropped…!

All the latest and greatest from Wib: News, announcements and press.

Visit the Newsroom