[et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#2b3669″ background_enable_image=”off” custom_margin=”||-25px||false|false”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.5.1″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow|800|||||||” text_text_color=”#242424″ text_font_size=”73px” text_line_height=”1.2em” header_font=”Barlow|800|||||||” header_text_color=”#FFFFFF” header_font_size=”55px” header_2_font=”Barlow|800|||||||” header_2_font_size=”74px” text_font_size_tablet=”” text_font_size_phone=”47px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”62px” header_font_size_phone=”44px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”62px” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|desktop”]

Equip your developers with relevant knowledge on OWASP Top 10 vulnerabilities

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.6.0″ _module_preset=”default” custom_margin=”||-10px||false|false”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text content_tablet=”

OWASP top 10 offers the most important guidelines for building and maintaining software with better security practices. When it comes to protecting our businesses, understanding these threat vectors can lead to a more systematic approach. But it also alerts us to the fact that security doesn’t stop here. At Avatao, we compiled several exercises that help your team take a deeper look into the most popular vulnerabilities reported by the OWASP community.

” content_phone=”

OWASP top 10 offers the most important guidelines for building and maintaining software with better security practices. When it comes to protecting our businesses, understanding these threat vectors can lead to a more systematic approach. But it also alerts us to the fact that security doesn’t stop here. At Avatao, we compiled several exercises that help our clients take a deeper look into the most popular vulnerabilities reported by the OWASP community.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”-30px||||false|false” custom_padding=”0px||||false|false”]

OWASP top 10 offers the most important guidelines for building and maintaining software with better security practices. When it comes to protecting our businesses, understanding these threat vectors can lead to a more systematic approach. But it also alerts us to the fact that security doesn’t stop here. At Avatao, we compiled several exercises that help your team take a deeper look into the most popular vulnerabilities reported by the OWASP community.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”left” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|0px|15px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][/et_pb_column][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” locked=”off”][et_pb_row _builder_version=”4.6.0″ _module_preset=”default” custom_margin=”-25px||-40px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#ffffff” header_2_font_size=”40px” custom_margin=”||0px||false|false” locked=”off”]

Discover Avatao’s OWASP Top 10 training

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”30px||||false|false”][et_pb_column type=”2_5″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/owasp-top-10-1.png” alt=”owasp top 10 vulnerabilities” title_text=”owasp top 10″ align=”center” _builder_version=”4.6.0″ _module_preset=”default” width=”100%” module_alignment=”center” custom_margin=”25px||||false|false” locked=”off”][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|30px|||false|false”][et_pb_text content_tablet=”

On the Avatao platform you can find practical exercises covering the most important OWASP Top 10 vulnerabilities, in the most popular programming languages, such as Java, JavaScript, Node.JS, C# and more.

” content_phone=”

On the Avatao platform you can find practical exercises covering the most important OWASP Top 10 vulnerabilities, in the most popular programming languages, such as Java, JavaScript, Node.JS, C# and more.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||20px||false|false” custom_padding=”0px||||false|false” locked=”off”]

On the Avatao platform you can find practical exercises covering the most important OWASP Top 10 vulnerabilities, in the most popular programming languages, such as Java, JavaScript, Node.JS, C# and more.

[/et_pb_text][et_pb_button button_url=”https://next.avatao.com/direct?orgid=cafdc337-3c84-41d0-9406-447779b06a08&module=e1d0aaa5-48aa-4a57-9602-e8454bd16a0f” url_new_window=”on” button_text=”Try an OWASP Top 10 exercise” button_alignment=”center” _builder_version=”4.9.10″ custom_button=”on” button_text_size=”22px” button_text_color=”#3dffdb” button_bg_color=”RGBA(0,0,0,0)” button_border_width=”2px” button_border_color=”#3dffdb” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|0px|15px|0px|false|false” custom_margin_tablet=”30px||30px||false|false” custom_margin_phone=”30px|0px|30px|0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][et_pb_text content_tablet=”

Topics developers can practice through real-life scenarios include:

” content_phone=”

Topics developers can practice through real-life scenarios include:

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||20px||false|false” custom_padding=”0px||||false|false” locked=”off”]

Topics developers can practice through real-life scenarios include:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”30px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”1. Broken access control” content_max_width=”768px” content_tablet=”

Broken access control is a type of vulnerability that, due to restrictions not being properly enforced, allows attackers to gain access to restricted resources by tricking authorization mechanisms.

” content_phone=”

Broken access control is a type of vulnerability that, due to restrictions not being properly enforced, allows attackers to gain access to restricted resources by tricking authorization mechanisms.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”||25px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Broken access control is a type of vulnerability that, due to restrictions not being properly enforced, allows attackers to gain access to restricted resources by tricking authorization mechanisms.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”2. Cryptographic failures” content_max_width=”768px” content_tablet=”

Sensitive data exposure has been expanded to this category since 2017 as cryptographic failures such as the weak or incorrect use of hashing, encryption or other cryptographic functions were the real root causes of this problem.

” content_phone=”

Sensitive data exposure has been expanded to this category since 2017 as cryptographic failures such as the weak or incorrect use of hashing, encryption or other cryptographic functions were the real root causes of this problem.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||-10px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Sensitive data exposure has been expanded to this category since 2017 as cryptographic failures such as the weak or incorrect use of hashing, encryption or other cryptographic functions were the real root causes of this problem.

 

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”-30px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”3. Injections” content_max_width=”768px” content_tablet=”

Injection flaws such as SQL, NoSQL, or Command happen when, as part of a command or query, untrusted data is sent to an interpreter. The attacker’s data is able to make the interpreter execute unwanted commands, or even access unauthorized data. Cross-site Scripting (XSS) is now part of this category as well.

” content_phone=”

Injection flaws such as SQL, NoSQL, or Command happen when, as part of a command or query, untrusted data is sent to an interpreter. The attacker’s data is able to make the interpreter execute unwanted commands, or even access unauthorized data. Cross-site Scripting (XSS) is now part of this category as well.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||25px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Injection flaws such as SQL, NoSQL, or Command happen when, as part of a command or query, untrusted data is sent to an interpreter. The attacker’s data is able to make the interpreter execute unwanted commands, or even access unauthorized data. Cross-site Scripting (XSS) is now part of this category as well.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”4. Insecure design” content_max_width=”768px” content_tablet=”

Due to weak use of secure design patterns, principles, and reference architectures, serious weaknesses and flaws stay under the surface no matter how perfectly we implement a software. This new category in 2021 also includes threat modeling, which is an essential tool to identify security issues in the earliest phase.

” content_phone=”

Due to weak use of secure design patterns, principles, and reference architectures, serious weaknesses and flaws stay under the surface no matter how perfectly we implement a software. This new category in 2021 also includes threat modeling, which is an essential tool to identify security issues in the earliest phase.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||25px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Due to weak use of secure design patterns, principles, and reference architectures, serious weaknesses and flaws stay under the surface no matter how perfectly we implement a software. This new category in 2021 also includes threat modeling, which is an essential tool to identify security issues in the earliest phase.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”5. Security misconfiguration” content_max_width=”768px” content_tablet=”

Incomplete and rarely updated configurations, open cloud storages, and error messages containing sensitive information often lead to security issues. External XML Entities (XXE) is now merged into this category.

” content_phone=”

Incomplete and rarely updated configurations, open cloud storages, and error messages containing sensitive information often lead to security issues. External XML Entities (XXE) is now merged into this category.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Incomplete and rarely updated configurations, open cloud storages, and error messages containing sensitive information often lead to security issues. External XML Entities (XXE) is now merged into this category.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”6. Vulnerable and outdated components” content_max_width=”768px” content_tablet=”

This category was renamed from “Using components with known vulnerabilities”. Various attack vectors are opening up from outdated open-source and third-party components. APIs and applications using components with known vulnerabilities can easily eliminate application defenses, leading to a variety of attacks.

” content_phone=”

This category was renamed from “Using components with known vulnerabilities”. Various attack vectors are opening up from outdated open-source and third-party components. APIs and applications using components with known vulnerabilities can easily eliminate application defenses, leading to a variety of attacks.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||20px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

This category was renamed from “Using components with known vulnerabilities”. Various attack vectors are opening up from outdated open-source and third-party components. APIs and applications using components with known vulnerabilities can easily eliminate application defenses, leading to a variety of attacks.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”7. Identification and authentication failures” content_max_width=”768px” content_tablet=”

Previously known as “Broken Authentication”. When authentication functions of applications are not implemented properly, attackers can easily misuse passwords, session tokens, or keys, and take advantage of other flaws in order to impersonate other users.

” content_phone=”

Previously known as “Broken Authentication”. When authentication functions of applications are not implemented properly, attackers can easily misuse passwords, session tokens, or keys, and take advantage of other flaws in order to impersonate other users.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||15px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Previously  known as “Broken Authentication”. When authentication functions of applications are not implemented properly, attackers can easily misuse passwords, session tokens, or keys, and take advantage of other flaws in order to impersonate other users.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”8. Software and data integrity failures” content_max_width=”768px” content_tablet=”

If the integrity of software updates and CI/CD pipelines are not verified, malicious actors can alter critical data that affects the software being updated or released. The earlier entry “Insecure Deserialization” was also merged into this category.

” content_phone=”

If the integrity of software updates and CI/CD pipelines are not verified, malicious actors can alter critical data that affects the software being updated or released. The earlier entry “Insecure Deserialization” was also merged into this category.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||10px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

If the integrity of software updates and CI/CD pipelines are not verified, malicious actors can alter critical data that affects the software being updated or released. The earlier entry “Insecure Deserialization” was also merged into this category.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”9. Security logging and monitoring failures” content_max_width=”768px” content_tablet=”

This category was previously called “Insufficient Logging & Monitoring”. When weakly applied, attackers can stay under the radar for months and cause enormous amounts of damage. Meanwhile, they are opening the door to further exploit systems, and to tamper with, extract, or destroy data.

” content_phone=”

This category was previously called “Insufficient Logging & Monitoring”. When weakly applied, attackers can stay under the radar for months and cause enormous amounts of damage. Meanwhile, they are opening the door to further exploit systems, and to tamper with, extract, or destroy data.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||20px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

This category was previously called “Insufficient Logging & Monitoring”. When weakly applied, attackers can stay under the radar for months and cause enormous amounts of damage. Meanwhile, they are opening the door to further exploit systems, and to tamper with, extract, or destroy data.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-20px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”10. Server-side request forgery” content_max_width=”768px” content_tablet=”

This threat vector, in which attackers enforce requests on behalf of an application server to access internal or external resources, is becoming more and more popular. As the request itself is coming from a legitimate source, applications may not take any notice of it (e.g., visiting an internal admin site from localhost).

” content_phone=”

This threat vector, in which attackers enforce requests on behalf of an application server to access internal or external resources, is becoming more and more popular. As the request itself is coming from a legitimate source, applications may not take any notice of it (e.g., visiting an internal admin site from localhost).

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||10px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

This threat vector, in which attackers enforce requests on behalf of an application server to access internal or external resources, is becoming more and more popular. As the request itself is coming from a legitimate source, applications may not take any notice of it (e.g., visiting an internal admin site from localhost).

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” _builder_version=”4.9.10″ background_color=”#FFFFFF” background_color_gradient_direction=”90deg” background_enable_image=”off” background_enable_video_mp4=”off” custom_margin=”||-15px||false|false” disabled=”on” locked=”off”][et_pb_row admin_label=”Row” _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ header_text_color=”#3b4249″ header_2_font=”Barlow|800|||||||” header_2_text_color=”#3b4249″ header_2_font_size=”44px” custom_margin=”-30px||20px||false|false”]

Learn more about OWASP topics

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow||||||||” text_text_color=”#3b4249″ text_font_size=”21px” custom_margin=”-10px||||false|false”]

Find out more about the OWASP Top 10 security topics Avatao covers, and try related exercises:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/access-control/” url_new_window=”on” button_text=”Access control” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#F4F6FF” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;” locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/authentication/” url_new_window=”on” button_text=”Authentication” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#F4F6FF” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;||” locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/authorization/” url_new_window=”on” button_text=”Authorization” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#F4F6FF” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;||” locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/insecure-direct-object-reference/” url_new_window=”on” button_text=”IDOR” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#F4F6FF” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;||” locked=”off”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-20px||||false|false” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/cross-site-request-forgery/” url_new_window=”on” button_text=”CSRF” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#f4f6ff” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;||” locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/cryptography/” url_new_window=”on” button_text=”Cryptography” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#f4f6ff” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;||” locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://staging.avatao.martengartner.com/security-logging/” url_new_window=”on” button_text=”Security logging” button_alignment=”center” _builder_version=”4.9.10″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_text_color=”#5666A7″ button_bg_color=”#f4f6ff” button_border_radius=”15px” button_font=”Barlow|800|||||||” button_icon=”%%36%%” custom_margin=”|0px|||false|false” custom_css_main_element=”min-width: 210px;” locked=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″][et_pb_row _builder_version=”4.6.0″ _module_preset=”default” width=”82%” max_width=”1665px” custom_margin=”-70px||-10px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.6.0″ header_font=”Barlow|800|||||||” header_font_size=”50px” header_line_height=”1.3em” header_2_font=”|800|||||||” header_2_font_size=”50px” text_orientation=”right” background_layout=”dark” module_alignment=”right” custom_margin=”35px|0px|0px|0px|false|false” custom_padding=”0px|25px|0px|0px|false|false” header_font_size_tablet=”” header_font_size_phone=”” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|tablet” locked=”off”]

Get started with OWASP Top 10 training

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|500|||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.9em” header_5_font_size=”20px” header_5_line_height=”1.3em” background_layout=”dark” width=”95.8%” custom_margin=”0px|-59px|0px|0px|false|false” custom_padding=”30px|0px|30px||false|false” hover_enabled=”0″ locked=”off” sticky_enabled=”0″]

Start onboarding your team right away and introduce OWASP Top 10 security training to your company efficiently.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”center” module_id=”demo-java-footer” module_class=”avataoevent_contact-cta_security-OWASP_click” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px|-10px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.10″ background_color=”#2b3669″ positioning=”none” vertical_offset=”1000px” horizontal_offset=”0px” position_origin_a_tablet=”” position_origin_a_phone=”” position_origin_a_last_edited=”on|desktop” position_origin_f_tablet=”” position_origin_f_phone=”” position_origin_f_last_edited=”on|desktop” position_origin_r_tablet=”” position_origin_r_phone=”” position_origin_r_last_edited=”on|desktop” width=”100%” min_height=”378px” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”0px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||||false|false” positioning_tablet=”” positioning_phone=”” positioning_last_edited=”on|phone” global_module=”2141″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”4.9.10″ width=”86%” max_width=”1288px” custom_margin=”30px||30px||false|false” custom_padding=”10px||0px||false|false” locked=”off”][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/avatao-logo-white.png” alt=”avatao” title_text=”avatao logo white” show_bottom_space=”off” align_tablet=”” align_phone=”center” align_last_edited=”on|phone” _builder_version=”4.9.10″ width_tablet=”65%” width_phone=”50%” width_last_edited=”on|tablet” custom_margin=”60px||0px||false|false” custom_margin_tablet=”||30px||false|false” custom_margin_phone=”||60px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false”][/et_pb_image][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” custom_margin=”20px||0px||false|false” custom_padding=”||15px||false|false” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]

Follow us

[/et_pb_text][et_pb_social_media_follow admin_label=”Social Media Follow” _builder_version=”4.6.0″ text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”][et_pb_social_media_follow_network social_network=”linkedin” url=”https://www.linkedin.com/company/avatao/” _builder_version=”4.5.1″ background_color=”#007bb6″ follow_button=”off” url_new_window=”on”]linkedin[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”twitter” url=”https://twitter.com/theavatao” _builder_version=”4.5.1″ background_color=”#00aced” follow_button=”off” url_new_window=”on”]twitter[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”facebook” url=”https://www.facebook.com/theavatao/” _builder_version=”4.5.1″ background_color=”#3b5998″ follow_button=”off” url_new_window=”on”]facebook[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”instagram” url=”https://www.instagram.com/theavatao/” _builder_version=”4.6.0″ _module_preset=”default” background_color=”#ea2c59″ follow_button=”off” url_new_window=”on”]instagram[/et_pb_social_media_follow_network][/et_pb_social_media_follow][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]

Copyright © 2024 Avatao

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.8″ custom_padding=”|||10px|false|false”][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”

Secure coding training

For managers

For developers

Compliance training

Capture The Flag

Why Avatao?

Platform features

Content we cover

Pricing

.

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_text_color=”#FFFFFF” header_2_text_color=”#FFFFFF” header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Secure coding training

Compliance Training

Continuous Learning

Capture The Flag

Platform features

Content we cover

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”

Secure coding training

For managers

For developers

Compliance training

Capture The Flag

Why Avatao?

Platform features

Content we cover

Pricing

Company

Our story

Company culture

Meet the team

Careers

Internship at Avatao

” content_phone=”

Resources

Blog

Customer stories

Ebooks and guides

Release notes

FAQ

.

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|50px||true|false” custom_margin_tablet=”” custom_margin_phone=”90px||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Resources

Blog

Customer stories

Ebooks and guides

For developers

FAQ

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”

Resources

Blog

Customer stories

Ebooks and guides

Release notes

FAQ

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

” content_phone=”

Company

Our story

Company culture

Meet the team

Careers

Internship at Avatao

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”90px|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Company

Our story

Why Avatao?

Company culture

Internship at Avatao

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”20px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]