![]() |
What makes business logic abuse popular is that generally it is not something that would be detected by a security process or application vulnerability scanning because the website is functioning as designed and without any security vulnerabilities and the traffic is not exhibiting any unusual or malformed requests (such as with SQL injection or XSS attacks). Instead, it occurs when criminals use the normal functionality of a web site in a way that is unintended causing negative consequences from loss of data, revenue and customers, to the tarnishing of an organization's brand. The post Battling Business Logic Abuse appeared first on Speaking of Security - The RSA Blog and Podcast. |
Update your feed preferences |
