As a reminder, we started with this section a month ago (yes, already a month! :O). Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.
In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.
If you missed the previous articles, we encourage you to go have a look. We have already covered:
As a reminder, we started with this section three weeks ago. Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.
In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.
If you missed the previous articles, we encourage you to go have a look. We have already covered:
Although it is not the first time we mention…
As a reminder, we started with this section two weeks ago. Our main purpose is to share the top cybersecurity attacks that applications are suffering and help by explaining how you can prevent them from happening.
In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.
If you missed the previous articles in which we went through Broken Object Level Authorization and Broken Authentication, go have a look :)
This week brings us a very important topic, one that is often left unattended…
As a reminder, we started with this section the past week. Here we talk about the top cybersecurity attacks that applications are suffering and how to prevent them from happening.
In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.
If you missed the previous article, in which we went through Broken Object Level Authorization, go have a look :)
This week is time for ‘Broken Authentication’, one of the most important things to take into account when developing web applications, given that…
This is the beginning of a series of stories that aim to share with you, the top cybersecurity attacks during the last couple of years, and more importantly, show you how to proactively prevent them from happening.
Given we are going through topics discussed in OWASP, lets briefly explain what this is. OWASP stands for ‘Open Web Application Security Project’, and it is a nonprofit foundation that works to improve web application security.
The researches and information shared by this nonprofit organization, are the result of years of study by several cybersecurity professionals, who contribute honorarily just for the sake…
As we started developing Strike, we knew that as a cybersecurity company, we needed to provide a service that was secure and reliable. This is why we prioritize unit testing, and while using MongoDB with transactions, we discovered there was no way to create tests with an in memory service that was self contained and run only while testing plus supporting transactions.
In the beginning, we started by using a MongoDB instance with a replica set online, but that increased our testing time significantly. For that reason, we decided to design our own library, one that would spin up an…
Founder & CEO at Strike.sh | Ethical Hacker | Computer Engineer | Go Getter ✌🏻 - “Embrace reality and deal with it” https://linkedin.com/in/santiagorosenblatt