© 2024 Prancer Enterprise

Blog

Prancer
April 13, 2023

Modern Penetration Testing Stories: Lessons Learned and the Benefits of Automation with Prancer Cloud Security

Implementing Automation with Prancer Cloud Security Penetration testing has come a long way since...

Read more
Prancer
April 12, 2023

OWASP top 10 API Security vulnerabilities – Lack of Resources and Rate Limiting

Introduction Lack of Resources and Rate Limiting refers to the risk of APIs being overwhelmed or ...

Read more
Prancer
April 12, 2023

OWASP top 10 API Security Vulnerabilities – Injection

Introduction Injection refers to the risk of attackers injecting malicious code or commands into ...

Read more
Prancer
April 12, 2023

OWASP top 10 API Security vulnerabilities – Broken Function Level Authorization

Introduction Broken Function Level Authorization refers to the risk of improper authorization con...

Read more
Prancer
April 12, 2023

OWASP top 10 API Security vulnerabilities – Excessive Data Exposure

Introduction Excessive Data Exposure refers to the risk of exposing sensitive data through APIs, ...

Read more
Prancer
April 12, 2023

OWASP top 10 API Security vulnerabilities – Insufficient Logging and Monitoring

Introduction Insufficient Logging and Monitoring refers to the risk of APIs not having proper log...

Read more