OWASP API Top 10 Breakdown | Study Session with CTF Challenges (DVAPI) Share: Download MP3 Similar Tracks Damn Vulnerable RESTaurant - API hacking PinkDraconian Bug Bounty Recon: Shadow APIs, Zombie Endpoints & How to Find Them? Medusa SEVEN things about API security - Philippe De Ryck - NDC Oslo 2024 NDC Conferences Cybersecurity Architecture: Five Principles to Follow (and One to Avoid) IBM Technology Bug Bounty Tip: Literally Step by Step How I Found A Bug I Got Paid For ChillingAndTalking Explaining Random H1 Reports for 20 Minutes Straight! Medusa How Bug Hunters Map GraphQL APIs? | PART 1 Medusa Top 12 Tips For API Security ByteByteGo Cybersecurity Architecture: Detection IBM Technology Cybersecurity Architecture: Application Security IBM Technology New OWASP API Top 10 for Hackers InsiderPhD The growing divide among React developers… Fireship The Kids Who Hacked Xbox fern This Tiny Upload Flaw = Full RCE on Tomcat?! (CVE-2025-24813 Deep Dive) Medusa My Favorite API Hacking Vulnerabilities & Tips NahamSec Subdomain Enumeration ALL KINDS! Medusa Transformers (how LLMs work) explained visually | DL5 3Blue1Brown API Hacking Demo | Bug Bounty Web App Testing Ryan John Loose Locks: A Podcast with _smile_hacker_ 🎙 : Snake Bytes Ep. 2 Medusa