Introduction

How are you all doing? It’s been a while since the last time I posted about hacking 😅

Was waiting until an interesting topic came up to my mind and I believe it did. I am 24 now but been hacking since 6–7, so pretty much people have been asking during my entire life “how can I hack?”, “is it difficult?” and “what do I need to know?” among many others.

Given the above, I thought it was good to start sharing a bit here so that people can understand and have another view to the topic. …


New logo

After a lot of hard work and final touches, last week we presented our new logo and the response of our followers was amazing! (Some of our followers from US, UK, Sweden, Australia, Germany, Uruguay and Argentina are receiving hoodies: yay!)


Security Design Principles

If you have been following us, we have been posting for some months now, focusing in raising awareness and explaining which are the most common vulnerabilities that you can find in your applications.

Having finished with the OWASP Top 10 related to APIs, we thought it was a good idea to wrap up the section by sharing with you 8 high level Security Design Principles that, if followed, should help mitigate most if not all of those vulnerabilities.

Taking into account the above, this story will differ from the previous ones and will focus on highlighting good practices to develop…


This section

As a reminder, we started with this section more than two months ago 🙌🏻 . Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

It is insane that with the 10th OWASP related article, we have been publishing for more than 10 weeks in a row and just wanted to thank all of you who are reading this and have read the past ones. To all of you, thank you very much!

In each story, we go through…


This section

As a reminder, we started with this section more than two months ago 🙌🏻 . Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:


This section

As a reminder, we started with this section two months ago (yes! this actually our 10th story in a row 😎). Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:


This section

As a reminder, we started with this section almost two months ago. Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:


This section

As a reminder, we started with this section a more than month ago. Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:


This section

As a reminder, we started with this section a month ago (yes, already a month! :O). Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:


This section

As a reminder, we started with this section three weeks ago. Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening.

In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack scenarios’ and ‘How to prevent?’, so by the end you have a comprehensive understanding.

If you missed the previous articles, we encourage you to go have a look. We have already covered:

API #4: Lack of Resources & Rate Limiting

Although it is not the first time we mention…

Santiago Rosenblatt

Founder & CEO at Strike.sh | Ethical Hacker | Computer Engineer | Go Getter ✌🏻 - “Embrace reality and deal with it” https://linkedin.com/in/santiagorosenblatt

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store