Part 10 of our OWASP API Security Top 10 Deep Dive Series The Object Heist: How API1:2023 Turned Digital IDs Into Master Keys The Great ID Switcheroo You walk into a hotel, flash your room key, and head toward the … Read More
Blog

OWASP API TOP 10: #2 API Security Risk: The Authentication Paradox
Part 9 of our OWASP API Security Top 10 Deep Dive Series How API2:2023 Became the Gateway to Digital Chaos In today’s digital ecosystem, where an overwhelming majority of organizations face API security problems in production, one vulnerability stands as … Read More

OWASP API TOP 10: #3 API Security Risk: Broken Object Property Level Authorization
Part 8 of our OWASP API Security Top 10 Deep Dive Series The Doctor’s Dilemma Imagine visiting a new doctor for a routine check-up. You share basic health details, height, weight, and medications – all needed to provide good care. … Read More

OWASP API TOP 10: #4 API Security Risk: Unrestricted Resource Consumption
Part 7 of our OWASP API Security Top 10 Deep Dive Series The Generosity Trap: When Digital Hospitality Becomes a Weapon The All-You-Can-Eat Dilemma Picture your favorite neighborhood restaurant – the one with warm lighting, friendly servers, and generous portions. … Read More

OWASP API TOP 10: #5 API Security Risks: Broken Function Level Authorization
Part 6 of our OWASP API Security Top 10 Deep Dive Series Here’s a simple question that reveals a dangerous assumption in modern software: Who decides what you’re allowed to do? In the physical world, this question has obvious answers. … Read More

OWASP API TOP 10: #6 API Security Risk: Unrestricted Access to Sensitive Business Flows
Part 5 of our OWASP API Security Top 10 Deep Dive Series The Speed of Greed: How Bots Hijack Your Business Logic Every music fan knows the drill. Your favorite artist announces a tour. Tickets go on sale Friday at … Read More

OWASP API TOP 10: #7 API Security Risk: Server Side Request Forgery
Part 4 of our OWASP API Security Top 10 Deep Dive Series The Puppet Master’s Paradox: When SSRF Turns APIs into Accomplices Imagine you’re at a party, and someone approaches you with a simple request:“Hey, could you ask Sarah over … Read More

OWASP API TOP 10: #8 Security Misconfiguration
Part 3 of our OWASP API Security Top 10 Deep Dive Series Thousand Tiny Betrayals: When Good APIs Go Bad #8 API Security Risk: Security Misconfiguration When’s the last time you checked the default settings on your coffee maker? If … Read More

OWASP API TOP 10: #9 Improper Inventory Management
Part 2 of the OWASP API Security Top 10 Deep Dive Series The Invisible APIs: How What You Can’t See Can Destroy You Psychology of Digital Blindness In September 2022, telecom giant Optus learned a $140 million lesson – and … Read More

OWASP API TOP 10: #10 Unsafe Consumption of APIs
Part 1: OWASP API Security Top 10 Deep Dive When Trusted APIs Turn Against You APIs are the lifeblood of modern software. But what happens when a bridge meant to connect systems becomes a gateway for attacks? Welcome to our … Read More