Skip to content
SecureLayer7
  • Home
  • Services
    • PENETRATION TESTING
      • Application Security
      • Mobile Application Security
      • Thick Client Penetration Testing
      • VoIP Penetration Testing
      • On Demand Penetration Testing
      • CODE AUDIT
      • Ethereum Smart Contract Audit
      • Source Code Audit
    • SECURITY EXPERTISE
      • IoT Device Security
      • ICO Security
      • Web Malware Removal
      • SAP Security Assessment
      • Red Team Assessment
      • CLOUD INFRASTRUCTURE
      • AWS Security Assessment
    • INFRASTRUCTURE SECURITY
      • Network Security
      • Server Hardening
      • Wireless Security Assessment
      • Firewall Configuration Review
      • Telecom Network Security
  • Resources
    • Resources
    • Advisories
  • Company
    • About
    • Management
    • Careers
  • Contact Us

Category: OWASP

Category Archive
Understanding OWASP API 06:2023 Unrestricted Access to Sensitive Business Flows

Understanding OWASP API 06:2023 Unrestricted Access to Sensitive Business Flows

· November 20, 2024 · 7 min read

In July 2023, a serious breach involving Ivanti’s EPMM surfaced due to the CVE-2023-35078 zero-day vulnerability. Attackers exploited this flaw, gaining unauthorized API access, manipulating server functions, and potentially exfiltrating…

Read More
OWASP TOP 10: Insufficient Attack Protection #7 – CAPTCHA Bypass

OWASP TOP 10: Insufficient Attack Protection #7 – CAPTCHA Bypass

· August 23, 2024 · 10 min read

Welcome to the seventh installment of our blog series on “Insufficient Attack Protection.” In this edition, we shine a spotlight on the growing concern of CAPTCHA bypass attacks, a well-known…

Read More
OWASP Top 10 : Penetration Testing with SOAP Service and Mitigation

OWASP Top 10 : Penetration Testing with SOAP Service and Mitigation

· August 5, 2024 · 9 min read

Simple Object Access Protocol (SOAP) is a Connection or an interface between the web services or a client and web service. SOAP is operated with application layer protocols like HTTP,…

Read More
OWASP TOP 10: Security Misconfiguration #5 – CORS Vulnerability and Patch

OWASP TOP 10: Security Misconfiguration #5 – CORS Vulnerability and Patch

· July 19, 2024 · 4 min read

Modern applications often depend on Cross-Origin Resource Sharing (CORS) to enable smooth integrations between services – but this convenience can become a serious security risk if misconfigured. 

Read More
What is WAF? How Web Application Firewall Evasion Techniques Work?

What is WAF? How Web Application Firewall Evasion Techniques Work?

· April 15, 2021 · 6 min read

A web application firewall is a specific kind of application firewall that applies explicitly to web applications. It is released before web applications and investigates Bi-directional web-based (HTTP) traffic -…

Read More
OWASP IoT Top 10 Series: Weak or Hardcoded Password Policy OWASP

OWASP IoT Top 10 Series: Weak or Hardcoded Password Policy OWASP

· February 15, 2021 · 5 min read

In the last blog we had explored OWASP IoT Top 10 vulnerabilities overview, now we will explore the impact of each of these OWASP vulnerabilities on IoT technologies and product…

Read More
OWASP Top 10 Vulnerabilities IoT Security: Lack of Physical Hardening

OWASP Top 10 Vulnerabilities IoT Security: Lack of Physical Hardening

· January 19, 2021 · 3 min read

With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being part of critical infrastructure…

Read More
OWASP Top 10 Overview and Vulnerabilities

OWASP Top 10 Overview and Vulnerabilities

· July 18, 2020 · 8 min read

OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and technologies for web application security. It is…

Read More
API Security Assessment OWASP 2019 Test Cases

API Security Assessment OWASP 2019 Test Cases

· June 17, 2020 · 6 min read

An Application Programming Interface (API) is a component that enables communication between two different applications. They can be applications developed on different platforms and it uses a different server for…

Read More
OWASP Top 10 – What are Different Types of XSS ?

OWASP Top 10 – What are Different Types of XSS ?

· April 17, 2019 · 7 min read

Cross Site Scripting (XSS) is the most popular web application vulnerability. It is a code injection attack that allows attackers to execute malicious JavaScript code in user’s browser. In this…

Read More

Posts pagination

Page 1 Page 2 Next »

Recent Posts

  • ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks
  • IPVanish VPN macOS Privilege Escalation – SecureLayer7
  • DeepChat openExternal RCE via XSS in Electron
  • OWASP A03: Software Supply Chain Failures Explained
  • A Deep Dive into CVE-2026-25049: n8n Remote Code Execution

Topics

  • Penetration Testing
  • Cybersecurity
  • Offensive Security
  • Web Application Security
  • API Security
  • Cloud Security
  • OWASP
  • Security Advisories
  • CVE Research
  • Knowledge Base
  • News

Quick Links

  • Home
  • About
  • Blog
  • Contact Us

About SecureLayer7

Leading offensive security firm offering penetration testing, API security scanning, and attack surface management. Learn more →

Services

  • Application Security
  • Network Security
  • Mobile Application Security
  • Thick Client Security

Security Topics

  • Penetration Testing
  • Offensive Security
  • Web Application Security
  • API Security
  • Cloud Security
  • OWASP
  • CVE Research
  • Security Advisories

Security Expertise

  • IoT Device Security
  • Red Teaming Assessment
  • VoIP Penetration Testing

Latest Articles

  • ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks
  • IPVanish VPN macOS Privilege Escalation – SecureLayer7
  • DeepChat openExternal RCE via XSS in Electron
  • OWASP A03: Software Supply Chain Failures Explained

© 2026 SecureLayer7 – Offensive Security, API Scanner & Attack Surface Management — All rights reserved.