A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration

In traditional applications, security misconfiguration can happen at any level of an application stack, including network services, platform, […]
The post A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration appeared first on Pro… Continue reading A Deep Dive Into Serverless Attacks. SLS-6: Security Misconfiguration

A Deep Dive into Serverless Attacks, SLS-4: XML External Entity (XXE) Attacks

Let me first apologize for the long absence. However, I haven’t been idle. I’ve been working hard to […]
The post A Deep Dive into Serverless Attacks, SLS-4: XML External Entity (XXE) Attacks appeared first on Protego.
The post A Dee… Continue reading A Deep Dive into Serverless Attacks, SLS-4: XML External Entity (XXE) Attacks

A Deep Dive into Serverless Attacks, SLS-3: Sensitive Data Disclosure

Great news! The OWASP Serverless Top 10 first release is out! And so, we continue with this blog […]
The post A Deep Dive into Serverless Attacks, SLS-3: Sensitive Data Disclosure appeared first on Protego.
The post A Deep Dive into Serverless At… Continue reading A Deep Dive into Serverless Attacks, SLS-3: Sensitive Data Disclosure