Use Cases

Use Cases February 11th, 2023

Use Cases – BOLA Attacks

Use Cases

Use Cases – BOLA Attacks

BOLA stands for Broken Object-Level Authorization. BOLA attacks are also referred to as IDOR (Insecure Direct Object […]

> Read More

Use Cases February 11th, 2023

Use Cases – Shadow & Zombie APIs

Use Cases

Use Cases – Shadow & Zombie APIs

Shadow and Zombie APIs refer to APIs that are not officially supported or documented by an […]

> Read More

Use Cases February 11th, 2023

Use Cases – Injection Attacks

Use Cases

Use Cases – Injection Attacks

Injection attacks can occur in web applications as well as APIs. They happen when an attacker […]

> Read More

Use Cases February 11th, 2023

Use Cases – Third Party Misconfiguration Attacks

Use Cases

Use Cases – Third Party Misconfiguration Attacks

Third-party misconfigurations (or configuration weaknesses) are among the numerous kinds of security misconfiguration attacks that bad actors exploit. […]

> Read More

Just dropped…!

All the latest and greatest from Wib: News, announcements and press.

Visit the Newsroom