5 Results / Page 1 of 1

Mobile app vulnerabilities



OWASP TOP 10 + Mobile app security + blog + secure coding + Website security Z. Oualid

What are the most common mobile apps vulnerabilities?

In the intricate world of mobile app development, where functionality meets vulnerability, understanding the common weak points is key to fortifying your digital creations. As developers and app owners, navigating the landscape of potential threats is a vital aspect of ensuring robust cybersecurity. So, what exactly are the mobile apps’ ...

using components with known vulnerabilities



WordPress + blog + secure coding + DevSecOps + Website security + OWASP TOP 10 Z. Oualid

Using Components with Known Vulnerabilities prevention

With the race to make software development even faster, companies start to adopt a new way technique based on using already developed code components. Unfortunately, this development technique comes with many security vulnerabilities that have made the software even less secure regardless of the enhancement the used development technology has ...

insecure deserialization



blog + secure coding + OWASP TOP 10 Z. Oualid

Insecure deserialization prevention simplified

After starting to use the object-oriented development concept, new types of vulnerabilities were born. Insecure deserialization vulnerabilities were one of those vulnerabilities. Therefore, what is an Insecure Deserialization vulnerability, and how to prevent it? Insecure deserialization vulnerability happens when the web application serializes or deserializes a user-controllable object. The main ...