SourceIvan NovikovA7: Cross-Site Scripting (XSS) — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#owasp-top-10#xss-attackA6: Security Misconfiguration ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#owasp-top-10#security-misconfigurationA5: Broken Access Control ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp-top-10#owasp#broken-access-controlWallarm API Firewall outperforms Nginx in a production environment3 years agoIvan NovikovOpen in Source#blog#api-security#api-firewallA4: XML External Entities (XXE) ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#xxe#owasp#owasp-top-10A3: Sensitive Data Exposure ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#sensitive-data-exposure#owasp#owasp-top-10A2: Broken Authentication ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#broken-authentication#owasp-top-10A1:Injection — Top 10 OWASP 2017 3 years agoIvan NovikovOpen in Source#blog#owasp#owasp-top-10What is the Reverse Proxy❓ Reverse vs. Forward Proxy3 years agoIvan NovikovOpen in Source#blog#proxy#reverse-proxy123