Skip to main content

The OWASP Top 10 for 2021 has been released, and Broken Access Control has risen to the top of the list.

 


 

The all-new OWASP Top 10 2021 includes three new categories and position adjustments, according to OWASP.


For every web application, the OWASP Top 10 is a minimum or basic security testing requirement.


The OWASP Top 10 was initially published in 2003, and it has undergone numerous updates since then. The draught report for 2021 is now available.



"The OWASP Top 10 2021 is a good start as a baseline for checklists and so on," OWASP noted, "but it's not sufficient in and of itself." 


OWASP Top 10 2021

 

A01:2021 – Broken Access Control


It is also known as an authorization, and it specifies how a web application allows access to material and capabilities to some users but not others. It rose to the top from fifth place in 2017.

A02:2021 – Cryptographic Failures

 

Shifted from third to the second position, previously it was called as Sensitive Data Exposure. The lack of encryption often leads to sensitive data exposure or system compromise.

 

A03:2021-Injection 

 

It is a technique in which an attacker uses non-validated input vulnerabilities to inject SQL instructions into a web application, which are then executed in the backend database. It has dropped to third place from first. 


A04:2021 Insecure Design


With the OWASP Top 2021, this is a new category that focuses on the dangers associated with design and architectural faults.


"Insecure design" is a wide term that encompasses a variety of flaws, such as absent or inefficient control design. 


A05:2021 – Incorrect Security Configuration


It has risen from sixth to fifth place, focusing on application security hardening and incorrectly configured permissions on cloud services. 


A06:2021 Vulnerable and Outdated Components

Because there isn't enough attack data, it was moved from second to sixth place. This category focuses on the vulnerable versions of all client-side and server-side components.



A07:2021 - Authentication and Identification Errors


This category, formerly known as Broken Authentication, focuses on authentication failures.It leads to automated assaults like credential stuffing, when attackers utilise a list of usernames and passwords to gain access to a system.


A08:2021 - Failures in Software and Data Integrity


This is a new category that was included in the OWASP Top 10 2021, and it focuses on software and data integrity failures related to code and infrastructure that does not guard against integrity violations.

 

A09:2021 - Failures in Security Logging and Monitoring


This category, which moves up one spot from eleventh, aids in the detection, escalation, and response to active breaches.



A10:2021 — Request Forgery on the Server (SSRF)


This category is concerned with securing a connection in which a web application is obtaining a remote resource without validating the URL provided by the user.

 

Comments

Popular posts from this blog

Alert for Weaponized TeamViewer Installer that delivers njRAT

Alert for Weaponized TeamViewer Installer that  delivers  njRAT   Hazard actors relying on legitimate, 9aaf3f374c58e8c9dcdd1ebf10256fa5 software Team Viewer for exploitation has been a totally commonplace situation. There have been numerous cases in which risk actors used 9aaf3f374c58e8c9dcdd1ebf10256fa5 software to deliver malware to the sufferers. In addition, a latest file from Cyble research & Intelligence Labs stated that the maximum popularly used remote computing device support software program, “Team Viewer” has been exploited by threat actors to deliver njRAT malware. Other software that become turning in njRAT malware include Wireshark, system Hacker, and so on., NJ RAT is a far flung get admission to Trojan that could perform keylogging, password stealing, facts exfiltration, gaining access to webcams, and microphones, downloading extra documents, and plenty of others. It changed into first determined in 2012 and was attacking companies in middle Japanese c...

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA.

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA. Cybercriminals are actively performing SIM swap attacks in diverse international locations to bypass 2 things Authentication and to compromise the numerous social media apps which include WhatsApp through porting a sufferer’s smartphone number to a brand new SIM card. This widespread assault brought on economic damages, stolen credentials, and seizes OTPs to bypass victims’ online money owed. There are various fraud facilities and thousands of operators are running round the arena to seamlessly port a cell phone wide variety to a new SIM with an excessive achievement ratio.   In this situation, countries like Brazil and Mozambique have an excessive fee of SIM swap fraud the use of various social engineering strategies, and phishing attacks. A hit tries of this assault allow fraudsters take manage of clients’ telephone numbers with a purpose to get hold of mobile money tran...

Former protection Engineer Arrested for Stealing $9 Million from Crypto alternate.

  Former protection Engineer arrested for stealing $9 Million from Crypto alternate. Shakeeb Ahmed, a former safety engineer, has been arrested for defrauding a decentralized crypto trade and stealing over $nine million. A digital currency trading, also known as a crypto currency alternate (DCE), is an enterprise that permits individuals to trade crypto currencies or digital currencies for different property, inclusive of conventional fiat money or other digital currencies. This marks the first crook case involving a smart agreement operated via a decentralized alternate. Vulnerability in Crypto exchange’s clever Contracts In July 2022, Ahmed took gain of vulnerability in clever contracts and inserted fake pricing facts, ensuing in fraudulent gains of about $9 million. He also utilized “flash loans” to defraud the crypto trade. Using his specialised capabilities as a senior protection engineer, he forcefully carried out the assault through reverse engineering smart contracts ...