Published instrike.sh·May 19, 2021Hacking #1 - How should I think?Introduction How are you all doing? It’s been a while since the last time I posted about hacking 😅 Was waiting until an interesting topic came up to my mind and I believe it did. I am 24 now but been hacking since 6–7, so pretty much people have been asking…Hacking6 min readHacking6 min read
Published instrike.sh·May 5, 2021Strike: What moves usNew logo After a lot of hard work and final touches, last week we presented our new logo and the response of our followers was amazing! (Some of our followers from US, UK, Sweden, Australia, Germany, Uruguay and Argentina are receiving hoodies: yay!)Values4 min readValues4 min read
Published instrike.sh·Apr 7, 2021REST Security Design PrinciplesSecurity Design Principles If you have been following us, we have been posting for some months now, focusing in raising awareness and explaining which are the most common vulnerabilities that you can find in your applications. Having finished with the OWASP Top 10 related to APIs, we thought it was a good idea…Cybersecurity3 min readCybersecurity3 min read
Published instrike.sh·Mar 31, 2021OWASP API #10: Insufficient Logging & MonitoringThis section As a reminder, we started with this section more than two months ago 🙌🏻 . Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening. It is insane that…Strike4 min readStrike4 min read
Published instrike.sh·Mar 24, 2021OWASP API #9: Improper Assets ManagementThis section As a reminder, we started with this section more than two months ago 🙌🏻 . Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening. In each story, we…Strike4 min readStrike4 min read
Published instrike.sh·Mar 17, 2021OWASP API #8: InjectionThis section As a reminder, we started with this section two months ago (yes! this actually our 10th story in a row 😎). …Strike4 min readStrike4 min read
Published instrike.sh·Mar 10, 2021OWASP API #7: Security MisconfigurationThis section As a reminder, we started with this section almost two months ago. Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening. In each story, we go through ‘Brief…Strike4 min readStrike4 min read
Published instrike.sh·Mar 3, 2021OWASP API #6: Mass AssignmentThis section As a reminder, we started with this section a more than month ago. Our main purpose, is to share once a week, one of the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening. In each story, we go through…Strike3 min readStrike3 min read
Published instrike.sh·Feb 24, 2021OWASP API #5: Broken Function Level AuthorizationThis section As a reminder, we started with this section a month ago (yes, already a month! :O). Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening. In each story, we go through ‘Brief explanation’…Strike4 min readStrike4 min read
Published instrike.sh·Feb 17, 2021OWASP API #4: Lack of Resources & Rate LimitingThis section As a reminder, we started with this section three weeks ago. Our main purpose is to share the top cybersecurity attacks that applications are suffering nowadays and help by explaining how you can prevent them from happening. In each story, we go through ‘Brief explanation’, ‘Is my API vulnerable?’, ‘Attack…Strike4 min readStrike4 min read