What’s next? – OWASP Top 10 2021

What’s next? – OWASP Top 10 2021

What’s Next? – OWASP Top 10 2021 Gábor Pék (Avatao CTO) Due to the urgent context changes in our work and life today, resilience and adoption were amongst our most essential attributes to utilize. One of the effects of these changes peaked in a never-seen...
Broken Access Control

Broken Access Control

Broken Access Control Márton Németh In this article we cover examples of broken access control, how to find it in your application and possible consequences. Access control, or authorization, is how a web application grants users access to some resources, but not...