All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
1:42
YouTube
Radware
What Is BOLA? | Broken Object Level Authorization Explained in 60 Seconds | API Security Risks
Welcome to another Radware Minute! In this quick video, Uri breaks down BOLA – Broken Object Level Authorization – one of the most common and dangerous API security vulnerabilities developers face today. What you'll learn: - What is BOLA and how it works - Real-world examples of how attackers exploit BOLA vulnerabilities - Why it ranks at ...
756 views
8 months ago
Related Products
API Example REST API Vulnerability Live
Ai Vulnerability PNG
Autocomplete Enabled Vulnerability
#OWASP Web Security Testing Guide
Master OWASP: Comprehensive Web Application Security Guide.
git.ir
Aug 27, 2024
Secure Your Web Application With OWASP
openclassrooms.com
Jan 23, 2025
Top videos
16:52
API1 - Broken Object Level Authorization | IDOR | crAPI
YouTube
The Cyber Expert
16K views
Apr 6, 2023
0:12
API Security Best Practices: 1. Authentication and Authorization: Implement robust authentication and authorization mechanisms, such as OAuth, JWT, or Basic Auth. 2. Data Encryption: Use HTTPS (TLS/SSL) to encrypt data in transit. 3. Input Validation: Validate user input to prevent SQL injection, cross-site scripting (XSS), and other attacks. 4. Rate Limiting: Implement rate limiting to prevent brute-force attacks and denial-of-service (DoS) attacks. 5. Error Handling: Implement robust error han
Facebook
Cyber security and ethical
34.4K views
3 months ago
0:10
API vulnerability scanner interface showing security test results.
Adobe
ABDULELLAH
1 month ago
OWASP ZAP Tutorial
5:30
Hands-On Web Penetration Testing with Kali Linux: OWASP-ZAP|packtpub.com
YouTube
Packt
10.2K views
Oct 8, 2018
8:15
How to Use OWASP ZAP with WebGoat for Web Security Testing
YouTube
TechTales
1.9K views
Jan 17, 2025
58:47
Complete Zap Tutorial: How to Use OWASP ZAP for Web Application Security Testing
YouTube
Sonal
21.7K views
Jul 24, 2024
16:52
API1 - Broken Object Level Authorization | IDOR | crAPI
16K views
Apr 6, 2023
YouTube
The Cyber Expert
0:12
API Security Best Practices: 1. Authentication and Authorization:
…
34.4K views
3 months ago
Facebook
Cyber security and ethical analysis
0:10
API vulnerability scanner interface showing security test results.
1 month ago
Adobe
ABDULELLAH
Qualys API Best Practices: Host List API | Qualys
Apr 14, 2021
qualys.com
2:15
⚠️ Broken Object Level Authorization (BOLA) in APIs | Ex
…
111 views
8 months ago
YouTube
HackSudo
Qualys API Best Practices: Host List Detection API | Qualys
Jul 9, 2021
qualys.com
15:18
owasp top 10 api || broken object level authorization api || api vulner
…
2.5K views
Jul 18, 2023
YouTube
Cyber World Hindi
1:46
Exploiting a Critical API Authentication Vulnerability in vex
…
229 views
1 month ago
YouTube
Polymorphic
9:33
Testing REST APIs for vulnerabilities
15.3K views
Jan 21, 2022
YouTube
MrTurvey
5:35
Test for BOLA Vulnerabilities with the free APIsec Scanner
564 views
11 months ago
YouTube
APIsec University
2:01
NEW API Vulnerability Scanner on Pentest-Tools.com
6.6K views
Aug 24, 2023
YouTube
Pentest-Tools
2:18
Account Reset link Bypass via Burpsuite – Understanding Vulner
…
2K views
Feb 27, 2025
YouTube
4get security
10:13
Finding Vulnerabilities and Hacking With OWASP ZAP
15.9K views
Apr 20, 2022
YouTube
SecNet Lab
21:47
API Security Testing with Postman: Best Practices and Techniques
29.5K views
Feb 12, 2021
YouTube
Postman
10:15
How to scan for vulnerabilities(CVE) using nmap
9.2K views
Dec 6, 2021
YouTube
Cyber Nash
11:55
API PENETRATION TESTING: THE MASS ASSIGNMENT VULNERABI
…
4.8K views
Jun 6, 2023
YouTube
BePractical
27:39
How to Use Nessus in Kali to Identify Vulnerabilities to Exploit
…
59.5K views
Feb 9, 2019
YouTube
CISO Global
0:57
Nuclei Tool High Speed Automated Vulnerability Scanning Web, API
…
13 views
2 months ago
YouTube
Flayto
1:00
Nuclei Tool High Speed Automated Vulnerability Scanning Web, API
…
25 views
2 months ago
YouTube
Flayto
18:08
Automated REST API Vulnerability Detection with WuppieFuzz
76 views
3 months ago
YouTube
Nordic APIs
6:05
Perform a Vulnerability Scan Using OWASP Zed Attack Proxy
21.5K views
Apr 1, 2022
YouTube
CyberOffense
12:17
Microsoft Defender for Endpoint | API | Basics and Fundamentals
8.7K views
Jun 13, 2022
YouTube
Concepts Work
5:14
Build a Python Vulnerability Scanner | Search CVE
1.8K views
8 months ago
YouTube
Vinsloev Academy
1:54
Critical IBM API Vulnerability Lets Hackers Skip Login 😱 — Fix It NOW!
1 views
2 months ago
YouTube
AI & CyberSecurity News
58:36
Learn API Security: OWASP, Testing, Best Practices | Postman
…
5.8K views
Dec 13, 2021
YouTube
Postman
20:20
Web Application Vulnerability Scanning with OWASP ZAP | TryH
…
46.1K views
Jun 26, 2021
YouTube
Motasem Hamdan
24:54
Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Di
…
48.2K views
Feb 25, 2021
YouTube
Flashback Team
7:20
Exploiting a Mass Assignment Vulnerability
12.2K views
Feb 26, 2024
YouTube
Intigriti
14:21
WordPress Vulnerability Scanning With WPScan
281.9K views
Jan 23, 2018
YouTube
HackerSploit
See more videos
More like this
Feedback