Business Logic Abuse: Technology Agnostic Mapping of Attack Types

Hosted By
François F. and 2 others

Details
OWASP's technology specific top 10 lists have provided a ton of value, but it's time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn't tied to a specific technology. In this talk we'll explore the newly published Business Logic Abuse Top 10 list, including the methodology behind it.

OWASP Jacksonville
See more events
This is a hybrid event.
Respond by
Monday, October 20, 2025
9:30 PM
Every 3rd Monday of the month until December 28, 2025
Online event
Link visible for attendees
Sponsors
Business Logic Abuse: Technology Agnostic Mapping of Attack Types
FREE
Limited spots left