News

A05:2021 – Security misconfiguration

A05:2021 – Security misconfiguration

Celia Catalán

Introduction Vulnerability Description  As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...

A05:2021 – Security misconfiguration

Celia Catalán

Introduction Vulnerability Description  As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...

La nueva regulación DORA: Implicaciones para la Resiliencia Operativa Digital en Europa

The new DORA regulation: Implications for Digit...

JUAN ANTONIO CALLES

The DORA regulation, also known as the Digital Operational Resilience Act, is a crucial regulatory framework recently implemented by the European Union that seeks to strengthen the digital operational resilience...

The new DORA regulation: Implications for Digit...

JUAN ANTONIO CALLES

The DORA regulation, also known as the Digital Operational Resilience Act, is a crucial regulatory framework recently implemented by the European Union that seeks to strengthen the digital operational resilience...

A04:2021 - Insecure design - Information disclosure

A04:2021 - Insecure design - Information disclo...

Celia Catalán

Introduction The disclosure of information is a security vulnerability, the criticality of which will depend on how sensitive the information obtained is.  It occurs when a web application exposes...

A04:2021 - Insecure design - Information disclo...

Celia Catalán

Introduction The disclosure of information is a security vulnerability, the criticality of which will depend on how sensitive the information obtained is.  It occurs when a web application exposes...

A03:2021 – Injection

A03:2021 – Injection

Celia Catalán

Injections are a type of vulnerability consisting of an attacker sending untrustworthy data through a request or query to an interpreter, causing a...

A03:2021 – Injection

Celia Catalán

Injections are a type of vulnerability consisting of an attacker sending untrustworthy data through a request or query to an interpreter, causing a...

A02:2021 - Cryptographic failures - Colisiones Hash

A02:2021 - Cryptographic failures - Colisiones ...

Olga Borrallo

What are cryptographic flaws? A cryptographic failure occurs when data protection is not adequate, regardless of whether the failure occurs due to incorrect use of a cryptographic algorithm...

A02:2021 - Cryptographic failures - Colisiones ...

Olga Borrallo

What are cryptographic flaws? A cryptographic failure occurs when data protection is not adequate, regardless of whether the failure occurs due to incorrect use of a cryptographic algorithm...

A01:2021 - Broken Access Control

A01:2021 - Broken Access Control

Celia Catalán

Access control on a website defines whether a user is allowed to access a certain resource or perform a certain action. This control can occur horizontally and vertically: Against...

A01:2021 - Broken Access Control

Celia Catalán

Access control on a website defines whether a user is allowed to access a certain resource or perform a certain action. This control can occur horizontally and vertically: Against...