-
TOPIC: Business Logic Abuse: Technology Agnostic Mapping of Attack Types OWASP's technology specific top 10 lists have provided a ton of value, but it's time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn't tied to a specific technology.
Get Tickets
Free