Главная
Study mode:
on
1
Intro
2
Who am I
3
What is OS
4
What Happened
5
Injection
6
Broken Authentication
7
Sensitive Data Exposure
8
Access Control
9
Security Configuration
10
Crosssite scripting
11
Known vulnerabilities
12
Speed of development
13
XML externa
14
Insecure deserialization
15
Insufficient logging
16
Demo
17
Wrap Up
Description:
Explore the latest changes in the OWASP Top 10 with security expert Bill Sempf in this 50-minute conference talk from BSides Cleveland 2018. Gain insights into critical web application security risks, including injection attacks, broken authentication, sensitive data exposure, and access control issues. Learn about emerging threats such as XML external entity attacks and insecure deserialization. Discover the importance of proper security configuration, addressing known vulnerabilities, and implementing sufficient logging practices. Watch a live demonstration and leave with a comprehensive understanding of the evolving cybersecurity landscape.

What's Changed in the New OWASP Top 10

Add to list