HeadlineA2: Broken Authentication ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#broken-authentication#owasp-top-10Ivan Novikov: Latest NewsThe Hand-y Etiquette of Modern All-Remote Culture1 year agoIvan NovikovWhat is threat modeling ❓ Definition, Methods, Example2 years agoIvan NovikovWhat is an SSL certificate ❓ Meaning and Types2 years agoIvan NovikovWhat is Cross Site Request Forgery CSRF | Example and Methods of protection2 years agoIvan NovikovServer side template injection — SSTI vulnerability ⚠️2 years agoIvan Novikov