Presenting an Unrestricted Resource Consumption vulnerability class using a password reset feature as an example.
Presenting an Unrestricted Resource Consumption vulnerability class using a password reset feature as an example.
Intro Hi!In this DevSec Selection episode, you will find some recent CVE proof of concepts, affecting GitLab and PHP, a guide to a Nuclei DAST. Also, at the end I added articles about recent breaches at Santander and Hugging Face, plus an article about serious security concerns of Microsoft Recall feature released recently. Also, in…
Broken Object Property Level presented in a practical way with methods for identifying and preventing vulnerabilities based on OWASP.
Intro Hi!I will start this edition with the following quote: “In a 2023 GitHub survey, developers reported that their top task, second only to writing code (32%), was finding and fixing security vulnerabilities (31%).” ~Nicole Choi (GitHub) In the newsletter you will find how Canva implemented Endpoint Vulnerability Management at scale, ideas for enhancing SAST…
Intro Hi!In this edition of DevSec Selection, I explore key topics in application and infrastructure security. We delve into the broken authentication security vulnerabilities. Next, an article compares EPSS with CVSS, offering a formula to prioritize vulnerability remediation at scale. I also included an article about less known Dependency Confusion supply chain attack where author…
Explaining one of the most common web API vulnerability classes - Broken Authentication in a practical manner. Providing a case study example based on the Damn Vulnerable RESTaurant API, including methods for identifying and preventing these vulnerabilities.
A review of DefectDojo Pro — a paid version of a well-known vulnerability management solution: Does DefectDojo Pro address all the pain points of DefectDojo OWASP Edition?
Presenting capabilities of DefectDojo in context of Vulnerability Management for DevSecOps and traditional application security engineers.
In this article, I’m presenting the Exploit Prediction Scoring System and its practical use cases in tandem with Common Vulnerability Scoring System.
Intro Hi!In this edition of my newsletter, I delve into the critical topic of API security with a special focus on Broken Object Level Authorization (BOLA), ranked as the number one threat in the OWASP TOP 10 API Security Risks. The article is presenting Damn Vulnerable RESTaurant as an example of such vulnerability. Furthermore,…