SourceIvan NovikovWhat is a Botnet ❓ Definition, Types, Example Attack2 years agoIvan NovikovOpen in Source#blogDiscovering shadow APIs with a API firewall3 years agoIvan NovikovOpen in Source#git#blogWhat is OpenAPI ❓ Concept, Examples and Advantages3 years agoIvan NovikovOpen in Source#blog#open-apiWhat is Graphql ❓ Definition with Example3 years agoIvan NovikovOpen in Source#blog#graphql-vs-rest#graphqlGuide: How to Hack API in 60 minutes or API Threats Simulation with Open-Source Tools3 years agoIvan NovikovOpen in Source#blog#apihack#hacks#hackingAPI security — Wiki: What is ❓ Why ❓ For PenTest & Best Practice3 years agoIvan NovikovOpen in Source#blog#api-securityWhat is RCE (Remote code execution) attack ❓ Prevention methods3 years agoIvan NovikovOpen in Source#blog#rce#remote-code-executionA10: Insufficient logging and monitoring ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#logging-and-monitoring#owasp-top-10#owaspA9: Using Components with Known Vulnerabilities ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp-top-10#owaspA8: Insecure Deserialization ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#insecure-deserialization#owasp#owasp-top-10123