Serverless Application Attacks SLS-1: Event Injection

A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication

Thanks for joining me for the second post in the series. In the previous post I discussed what […] The post A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication appeared first on Protego ... Read More
Serverless Application Attacks SLS-1: Event Injection

A Deep Dive into Serverless Attacks, SLS-1: Event Injection

The OWASP Serverless top 10 project was just launched. It aims at educating practitioners and organizations about the […] The post A Deep Dive into Serverless Attacks, SLS-1: Event Injection appeared first on Protego ... Read More
If you rely on a WAF for Securing Serverless Apps, you'll leave many gaping security holes.

6 Things You’re Probably Doing Wrong Securing Serverless Apps

Do you ever have that sinking feeling in the pit of your stomach, worrying that you’ve forgotten something? […] The post 6 Things You’re Probably Doing Wrong Securing Serverless Apps appeared first on Protego ... Read More