![The battle for sufficient Logging and Monitoring](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/646c77aee94c5dc81ea81b29_Matrix-min.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
5
min read
The Matrix Chronicles: API Security and the battle for sufficient Logging and Monitoring
Unplugged from Reality: API-log-alypse
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
May 23, 2023
5
min read
![The perils of improper asset Management](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/6463cf518a149b8c40654f86_NightKing.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
4
min read
The Game of (Improper) Asset Management: Protecting Your APIs from the Seven Kingdoms of Vulnerabilities
The perils of improper asset Management
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
May 16, 2023
4
min read
![Don't get your memory erased](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/645a11d946a1cf335cda24bf_xNXDAovetmWoXQJKw3Dgbe-min.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
5
min read
Recall the Risks: Protecting Against Injection Attacks in Your APIs
Don't get your memory erased
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
May 9, 2023
5
min read
![Mr. Bean's Guide to Avoiding Security Misconfigurations in APIs](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/644f8fc64166b66d3aa31309_mrbean-min.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
5
min read
Mr. Bean's Guide to Avoiding Security Misconfigurations in APIs
API related misconfigurations pitfalls
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
May 1, 2023
5
min read
![Mass Assignment Iceberg](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/64478f2b8da47b8182388ffe_ElsaTitanic.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
5
min read
Mass Assignment: The Iceberg that Sinks Your API's Security
The Danger in Blind Objectification
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
April 25, 2023
5
min read
![Saving the API World from Broken Function-Level Authorization](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/643d6f43a6a3659afae067b5_chuck_yellow.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
4
min read
Saving the API World from Broken Function-Level Authorization - An Action-Packed Adventure
BFLA - Not the Sweetest Deal
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
April 17, 2023
4
min read
![API Wars - The Battle Against Lack of Resources and Rate Limiting](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/6433f00294cfb19a6278bda4_An%20image%20of%20a%20spacecraft%20being%20attacked%20by%20a%20swarm%20of%20bits-min.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
6
min read
API Wars: The Battle Against Lack of Resources and Rate Limiting
Managing the API Galaxy: A Must-Have
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
April 10, 2023
6
min read
![Dont Let Broken Authentication Get The Drop On Ya](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/655c9406dc96461150d0ac5e_Cowboy2.png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
5
min read
Broken Authentication: A Guide to Keeping Your APIs Safe
Western guide to broken authentication
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
March 27, 2023
5
min read
![a funny Bollywood-style action cartoon hero breaking through a wall of source code](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/655c913b46c6c8df80afbbba_bola-p-800%20(1).png)
OWASP Top Ten![clock icon](https://cdn.prod.website-files.com/6357c772bd0a59790d6cfdf5/64076b24c84f40d745cdc6d8_clock.svg)
5
min read
A Desi-Inspired Journey Through Broken Object-Level Authorization (BOLA)
The Bollywood Guide to BOLA
![Ofer Hakimi](https://cdn.prod.website-files.com/63c440aece5aa2100bdcbeb1/65fd7bb7c33ec8f99844bd90_6412e0edf4e60d0ec657dfdd_OferLinkedIn.avif)
Ofer Hakimi
March 23, 2023
5
min read