top of page
Search

OWASP Top - 10


OWASP Top 10- Mobile Risks (PART — 2)
Hey, readers! Hope you’ve all understood the top 5 vulnerabilities from our last blog. Now, gear up for the Part 2 of the OWASP Top 10 mobile risks. We’re digging deeper into the rabbit hole, so get ready! Here is the link for previous Top 5 Vulnerabilities. M6: Inadequate Privacy Controls Application-specific privacy controls aim to safeguard Personally Identifiable Information (PII), like names, addresses, credit card details, email and IP addresses, and sensitive data on h
Aastha Thakker
8 min read


OWASP Top 10- Mobile Risks (PART- 1)
Hey there! Ready to explore the key stuff every pen tester should know? Let’s jump into the essentials! OWASP stands for Open Web Application Security Project. It is a nonprofit organization dedicated to improving the security of software. It provides freely available resources, tools, and guidelines to help organizations and individuals develop, deploy, and maintain secure software applications. Reference used https://owasp.org/www-project-mobile-top-10/ . It focuses on va
Aastha Thakker
7 min read


OWASP Top 10- Web Application Vulnerabilities (PART- 2)
Hey, readers! Hope you’ve all understood the top 5 vulnerabilities from our last blog. Now, gear up for the Part 2 of the OWASP Top 10 vulnerabilities. We’re digging deeper into the rabbit hole, so get ready! Here is the link for previous Top 5 Vulnerabilities . 6. Vulnerable and Outdated Components A06:2021-Vulnerable and Outdated Components was previously titled Using Components with Known Vulnerabilities and is #2 in the Top 10 community survey, but also had enough data t
Aastha Thakker
7 min read


OWASP Top 10- Web Application Vulnerabilities (PART- 1)
Hey there! Ready to explore the key stuff every pen tester should know? Let’s jump in! A vulnerability is a weakness or flaw in a system’s design, implementation, or configuration that could be exploited to compromise the system’s security, integrity, or availability. Some Examples are: a. Default Passwords: Use of default or easily guessable passwords, creating a security loophole. b. Lack of Encryption: Exposes sensitive data during transmission, creating risk of unauthor
Aastha Thakker
8 min read
bottom of page