Network Security Channel
2.53K subscribers
5.33K photos
3.42K videos
5.56K files
4.43K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
#DiyakoSecureBow

Analytics
OWASP Top 10 API Security Risks - 2023

Risk:
1.
API1:2023 - Broken Object Level Authorization
Description:
APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface of Object Level Access Control issues. Object level authorization checks should be considered in every function that accesses a data source using an ID from the user.

2.
API2:2023 - Broken Authentication
Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising a system's ability to identify the client/user, compromises API security overall.

3.
API3:2023 - Broken Object Property Level Authorization
This category combines API3:2019 Excessive Data Exposure and API6:2019 - Mass Assignment, focusing on the root cause: the lack of or improper authorization validation at the object property level. This leads to information exposure or manipulation by unauthorized parties.

4.
API4:2023 - Unrestricted Resource Consumption
Satisfying API requests requires resources such as network bandwidth, CPU, memory, and storage. Other resources such as emails/SMS/phone calls or biometrics validation are made available by service providers via API integrations, and paid for per request. Successful attacks can lead to Denial of Service or an increase of operational costs.

5.
API5:2023 - Broken Function Level Authorization Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers can gain access to other users’ resources and/or administrative functions.
https://owasp.org/API-Security/editions/2023/en/0x11-t10

@Engineer_Computer

#businessadvisor #cyberdefense #data #gpt4 #ai #cybersecurityawareness #cybersecuritytraining #cybercrime #cyberdefense #networksecurity
#securityaudit #intelligenceéconomique #analytics #research #mal #malware #reverseengineering #engineering #team #business #software #security
SOC ANALYST.pdf
2.4 MB
🚀 Master the Art of Cyber Defense with SOC Expertise! 🔥

🌐 What is a Security Operations Center (SOC)?
A SOC is the frontline of cybersecurity, where teams monitor, detect, and respond to threats in real-time. It’s the beating heart of an organization’s defense strategy! 💻

💡 Why should you learn about SOC?
✔️ 24/7 Threat Monitoring: Stay ahead of potential breaches.
✔️ Incident Response Expertise: Act swiftly and effectively during attacks.
✔️ Proactive Defense: Mitigate risks before they escalate.
✔️ Career Growth: SOC skills are in high demand in the cybersecurity industry!

📚 Want to enhance your skills and explore the SOC framework?

#SOC #Cybersecurity #InformationSecurity #IncidentResponse #ThreatDetection #NetworkSecurity #TechCareers #CyberDefense #ITSecurity #TechCommunity

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
وقتی یک بات‌نت رکورد می‌شکنه: ۲۹.۷ ترابیت بر ثانیه!

اگر فکر می‌کنین حملات DDoS دیگه خبرساز نمی‌شن، این آمار Cloudflare نظرتون رو عوض می‌کنه:
بات‌نت Aisuru در Q3-2025 موفق شد:
حملات DDoS با پیک ≈29.7 Tbps و ≈14.1 Bpps بسازه
بین 1 تا 4 میلیون دستگاه IoT رو به ارتش زامبی خودش تبدیل کنه
بیش از 1,300 حمله hyper-volumetric رو در یک فصل اجرا کنه
تکنیک جالبش چی بود؟ UDP carpet-bombing - همزمان هزاران پورت رو بمباران می‌کنه و با randomization توی packet attributes از فیلترها فرار می‌کنه. یک نوع "حمله‌ای که قابل پیش‌بینی نیست" طراحی شده.
چرا این مهمه؟ دستگاه‌های IoT همچنان ضعیف‌ترین حلقه زنجیره امنیت سایبری هستن. از دوربین‌های مداربسته گرفته تا روترهای خانگی - هر دستگاه متصل به اینترنت که امنیتش نادیده گرفته بشه، می‌تونه بخشی از یک سلاح سایبری بشه.

حالا سوال اینجاست: اگر یک بات‌نت می‌تونه با 1-4 میلیون دستگاه IoT چنین قدرت ویرانگری داشته باشه، وقتی تعداد دستگاه‌های متصل به اینترنت تا سال 2030 به بیش از 29 میلیارد می‌رسه، چه انتظاری باید از نسل بعدی حملات داشته باشیم؟ 🤔

#Cybersecurity #DDoS #Cloudflare #NetworkSecurity #InfoSec
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥31👍1👏1