<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>OWASP on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/tags/owasp/</link><description>Recent content in OWASP on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sat, 02 May 2026 13:00:00 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/tags/owasp/index.xml" rel="self" type="application/rss+xml"/><item><title>LLM Penetration Testing: 2026 Methodology Guide</title><link>https://bsg.tech/blog/llm-penetration-testing-methodology/</link><pubDate>Sat, 02 May 2026 13:00:00 +0000</pubDate><guid>https://bsg.tech/blog/llm-penetration-testing-methodology/</guid><description>&lt;p&gt;LLM penetration testing is not a normal web-app pentest with a chatbot bolted on. The attack surface includes the prompt layer, model behaviour, retrieval (RAG), tool and agent invocation, and output handling — and the most damaging failures usually live in the seams between those layers.&lt;/p&gt;</description></item><item><title>API Security Testing: OWASP API Top 10 Walkthrough</title><link>https://bsg.tech/blog/api-security-testing/</link><pubDate>Wed, 14 Jan 2026 21:56:37 +0000</pubDate><guid>https://bsg.tech/blog/api-security-testing/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;APIs (Application Programming Interfaces) have become the backbone of modern software architecture. From mobile apps to microservices, organisations rely on APIs to connect systems, share data, and deliver functionality. But this connectivity comes with risk.&lt;/p&gt;
&lt;p&gt;In 2026, APIs represent one of the most common attack vectors in web applications. According to industry data, 57% of organisations experienced an API-related data breach in the past year, with 73% of those facing three or more separate incidents. Major breaches continue to be traced back to insecure API endpoints.&lt;/p&gt;</description></item><item><title>OWASP LLM Top 10 (2025): Vulnerabilities &amp; Mitigations</title><link>https://bsg.tech/blog/owasp-llm-top-10/</link><pubDate>Mon, 12 Jan 2026 18:20:19 +0000</pubDate><guid>https://bsg.tech/blog/owasp-llm-top-10/</guid><description>&lt;p&gt;Every organisation seems to be integrating large language models into their products and workflows. Chatbots, code assistants, document analysers, customer service agents—generative AI is everywhere. But security hasn’t kept pace with adoption.&lt;/p&gt;
&lt;p&gt;OWASP recognised this gap and released a dedicated Top 10 for LLM Applications. Unlike traditional web vulnerabilities that developers have been battling for decades, LLM risks are fundamentally different. These systems process natural language, generate unpredictable outputs, and often have access to sensitive data and powerful actions. The attack surface is unlike anything we’ve seen before.&lt;/p&gt;</description></item><item><title>OWASP Top 10 2025: What Changed and Why It Matters</title><link>https://bsg.tech/blog/owasp-top-10/</link><pubDate>Mon, 12 Jan 2026 01:23:41 +0000</pubDate><guid>https://bsg.tech/blog/owasp-top-10/</guid><description>&lt;p&gt;The OWASP Top 10 is the definitive benchmark for web application security. The 2025 release brings the most significant changes in years: two entirely new vulnerability categories and major ranking shifts that reflect how modern attacks have evolved.&lt;/p&gt;
&lt;p&gt;These changes aren’t academic—they shape security policies, &lt;a href="https://bsg.tech/blog/penetration-testing/"&gt;penetration testing requirements&lt;/a&gt;, and development practices across the industry. Understanding what changed helps security teams prioritise resources and protect what matters most.&lt;/p&gt;</description></item><item><title>Unforgivable Software Vulnerabilities</title><link>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</link><pubDate>Fri, 04 Apr 2025 16:27:14 +0000</pubDate><guid>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</guid><description>&lt;p&gt;Every piece of software has bugs. Many have vulnerabilities. But not all software vulnerabilities are created equal.&lt;/p&gt;
&lt;p&gt;Some are complicated, buried deep in obscure logic, or made possible by bleeding-edge exploit techniques. Others—well, others are glaringly obvious. These are the ones that make security professionals shake their heads and ask: &lt;em&gt;How did this ever make it to production?&lt;/em&gt;&lt;/p&gt;</description></item><item><title>SAMMY: Free Tool to Implement OWASP SAMM Security</title><link>https://bsg.tech/blog/enhance-software-security-with-sammy-and-owasp-samm/</link><pubDate>Mon, 04 Nov 2024 16:48:46 +0000</pubDate><guid>https://bsg.tech/blog/enhance-software-security-with-sammy-and-owasp-samm/</guid><description>&lt;p&gt;In today’s rapidly evolving digital landscape, ensuring the &lt;a href="https://bsg.tech/blog/software-product-security-where-to-start/"&gt;security of software applications&lt;/a&gt; is paramount. The OWASP Software Assurance Maturity Model (SAMM) provides organizations with a structured framework to assess and enhance their software &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security practices&lt;/a&gt;. To effectively implement SAMM, organizations can leverage SAMMY, a comprehensive management tool developed by Codific.&lt;/p&gt;</description></item><item><title>BSG becomes an OWASP corporate member!</title><link>https://bsg.tech/blog/berezha-becomes-owasp-corporate-member/</link><pubDate>Tue, 08 Dec 2020 09:00:00 +0000</pubDate><guid>https://bsg.tech/blog/berezha-becomes-owasp-corporate-member/</guid><description>&lt;p&gt;&lt;a href="https://owasp.org"&gt;OWASP&lt;/a&gt; is the most known global non-commercial organization dealing with software security. It was established in 2001 and had been publishing its famous application security risks rating – the OWASP Top 10 – since 2003. The number of OWASP initiatives and chapters is continuously growing, making it the leading contributor in application security methodologies and a prominent industry think tank. Do you feel like Berezha Security has a strong connection with OWASP? That’s correct, and here’s why.&lt;/p&gt;</description></item></channel></rss>