Assessments


Results = 6
Assessment Description Score
000 - #Testing 123
Tags: Data
Lorem ipsum dolor sit amet. Et ducimus earum in veniam eligendi eos expedita ipsa sed accusantium voluptas id rerum atque et dolores aspernatur. 20 Select
DT-000 - Data Theft / Exfiltration
Tags: Data; API; Database; Storage; Data in Transit; Data at Rest
Data theft risk refers to the potential threat of unauthorized access to sensitive information, which can lead to the exposure, misuse, or loss of data. This risk can arise from various sources, including cyberattacks, insider threats, or vulnerabilities in a company's security systems. 45 Select
OWASP - OWASP: API Security 2023
Tags: API; Data; Data in Transit; WAF
API (Application Programming Interface) risks include potential vulnerabilities such as Distributed Denial of Service (DDoS) attacks, unauthorized access, broken object level permissions, and injection attacks if proper security measures are lacking. This can result in data leakage, with an increased risk if encryption is inadequate. 20 Select
OWASP - OWASP: LLMs 2025
Tags: AI; LLM
Risk & Mitigations for LLMs and Gen AI Apps outlining vulnerabilities and mitigations for developing and securing generative AI and large language model applications across the development, deployment and management lifecycle. 84 Select
OWASP - OWASP: Mobile Security 2024
Tags: Mobile
The OWASP Mobile Top 10 is a list of the most critical security risks to mobile applications. It includes improper platform usage, insecure data storage, insecure communication, weak authentication, insufficient cryptography, insecure authorization, poor client code quality, code tampering, reverse engineering, and extraneous functionality. 16 Select
OWASP - OWASP: Web Security 2021 (2025 Coming Soon!!!)
Tags: Web
The OWASP Top Ten is a list of the most critical security risks to web applications, compiled by the Open Web Application Security Project (OWASP). It serves as a guideline for developers and security professionals to help them understand and mitigate the most common and severe vulnerabilities in web applications. 4 Select
An error has occurred. This application may no longer respond until reloaded. Reload 🗙