Business Logic Abuse: Technology Agnostic Mapping of Attack Types

Hosted By
Thomas and 3 others

Details
OWASP's technology specific top 10 lists have provided a ton of value, but it's time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn't tied to a specific technology.
In this talk we'll explore the newly published Business Logic Abuse Top 10 list, including the methodology behind it.

OWASP Atlanta Chapter
See more events
This is a hybrid event.
Online event
Link visible for attendees
Business Logic Abuse: Technology Agnostic Mapping of Attack Types
FREE