Image for post
Image for post

This section

As a reminder, we started with this section a month ago (yes, already a month! :O). Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:


Image for post
Image for post

This section

As a reminder, we started with this section three weeks ago. Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:

API #4: Lack of Resources & Rate Limiting

Although it is not the first time we mention…


Image for post
Image for post

This section

As a reminder, we started with this section two weeks ago. Our main purpose is to share the top cybersecurity attacks that applications are suffering and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles in which we went through and , go have a look :)

API #3: Excessive Data Exposure

This week brings us a very important topic, one that is often left unattended…


Image for post
Image for post

This section

As a reminder, we started with this section the past week. Here we talk about the top cybersecurity attacks that applications are suffering and how to prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous article, in which we went through , go have a look :)

API #2: Broken Authentication

This week is time for ‘Broken Authentication’, one of the most important things to take into account when developing web applications, given that…


Image for post
Image for post

A new section

This is the beginning of a series of stories that aim to share with you, the top cybersecurity attacks during the last couple of years, and more importantly, show you how to proactively prevent them from happening.

OWASP API Top 10

Given we are going through topics discussed in OWASP, lets briefly explain what this is. OWASP stands for ‘Open Web Application Security Project’, and it is a nonprofit foundation that works to improve web application security.

The researches and information shared by this nonprofit organization, are the result of years of study by several cybersecurity professionals, who contribute honorarily just for the sake…


Image for post
Image for post

Short story behind ‘strikememongo’

As we started developing , we knew that as a cybersecurity company, we needed to provide a service that was secure and reliable. This is why we prioritize unit testing, and while using MongoDB with transactions, we discovered there was no way to create tests with an in memory service that was self contained and run only while testing plus supporting transactions.

In the beginning, we started by using a MongoDB instance with a replica set online, but that increased our testing time significantly. For that reason, we decided to design our own library, one that would spin up an…

Santiago Rosenblatt

Founder & CEO at | Ethical Hacker | Computer Engineer | Go Getter ✌🏻 - “Embrace reality and deal with it”

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store