PinnedKrzysztof PranczkWeb API Security Champion: Broken Object Level Authorization (OWASP TOP 10)Explaining one of the most common web API vulnerability classes — Broken Object Level Authorization in a practical manner. Providing a…Apr 22Apr 22
PinnedKrzysztof PranczkSecurity Code Challenge for Developers & Ethical Hackers — The Damn Vulnerable RESTaurantIntroduction to a security code challenge dedicated to developers and ethical hackers. It focuses on security vulnerabilities in Web API.Apr 3Apr 3
PinnedKrzysztof PranczkPython for DevSecOps and Any Security EngineerDoes DevSecOps Engineer need programming skills? What is the value of utilising Python for security purposes? What you need to learn to…Oct 11, 20234Oct 11, 20234
PinnedKrzysztof PranczkA Practical Approach to SBOM in CI/CDThe article covers the concept of SBOM, its advantages, popular formats and practical implementations for both Java and Python projects.Sep 17, 20233Sep 17, 20233
Krzysztof PranczkBuilding and Automating Cybersecurity Newsletter — DevSec Selection Case StudyNowadays, creating an email-based newsletter is a straightforward process, as several platforms allow you to build one quickly and often…4d ago4d ago
Krzysztof PranczkBroken Function Level Authorization — Web API Security Champion Part VExplaining one of the most common web API vulnerability classes — Broken Function Level Authorization in a practical manner. Providing a…Jul 20Jul 20
Krzysztof PranczkUnrestricted Resource Consumption in a Password Reset — Web API Security Champion Part IVExplaining one of the most common web API vulnerability classes — Unrestricted Resource Consumption in a practical manner. Providing a…Jun 18Jun 18
Krzysztof PranczkinCodeXWeb API Security Champion Part III: Broken Object Property Level Authorization (OWASP TOP 10)Explaining one of the most common web API vulnerability classes — Broken Object Property Level Authorization in a practical manner…Jun 31Jun 31
Krzysztof PranczkWeb API Security Champion Part II: Broken Authentication (OWASP TOP 10)Explaining one of the most common web API vulnerability classes — Broken Authentication in a practical manner. Providing a case study…Jun 3Jun 3
Krzysztof PranczkinITNEXTDetecting Banker Malware Installed on Android DevicesThis article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the…Mar 202Mar 202