PinnedHacking APIs: Authentication & Authorization AttacksAs you know, API/Endpoints are called from many types of devices to receive information. In terms of security, your API/Endpoints must to…Nov 24, 20232Nov 24, 20232
Hacking APIs:Breaking AuthenticationAPIs with weak authentication or not control in places are the best targets of attackers or bad guys, leading to unauthorized access and…1d ago1d ago
API Security:Why it mattersIn this post, we’ll break down API security in a simple way, talk about why it’s important, and look at some real-world attacks. We’ll also…Feb 22Feb 22
Seguridad en Contenedores: Docker 101 Gestión de ImágenesEn el siguiente artículo describiré algunas aspectos básicos para la gestión de imágenes en docker.May 12, 2024May 12, 2024
Seguridad en Contenedores : Docker 101 FundamentosEn el objetivo de esta serie de articulos relacionados a contenedores es abordar de manera general la tecnologia con el objetivo de…May 9, 2024May 9, 2024
API Security: Essential Tools for Endpoint AnalysisIn today’s digital realm, fortifying APIs (Application Programming Interfaces) is imperative to shield sensitive data and uphold software…Mar 14, 2024Mar 14, 2024
Web Security 101 : Cross-Site Scripting (XSS) AttacksIn this article, I would like to explain how XSS works,This is not a technically article, but I hope it will be useful for you, as it was…Feb 9, 2024Feb 9, 2024
Web Security Academy — Business Logic Vulnerabilities WalkthroughThese kind of vulnerabilities are harder to detected by defensive security tools, they don’t involve injecting known payloads. In fact…Jan 16, 2024Jan 16, 2024