<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <title>SPECTROSEC — Technical Blog</title>
  <subtitle>Penetration testing, red teaming and secure software development. We find vulnerabilities before attackers do.</subtitle>
  <link href="https://spectrosec.com/en/feed.xml" rel="self"/>
  <link href="https://spectrosec.com/en/blog/"/>
  
  <updated>Sun, 05 Apr 2026 00:00:00 GMT</updated>
  <id>https://spectrosec.com/en/</id>
  <author><name>SPECTROSEC S.r.l.</name><email>info@spectrosec.com</email></author>
  
  <entry>
    <title>OWASP Top 10 2025 | What Changed and Why It Matters</title>
    <link href="https://spectrosec.com/en/blog/pentest-owasp-top-10-2025.html"/>
    <updated>Sun, 05 Apr 2026 00:00:00 GMT</updated>
    <id>https://spectrosec.com/en/blog/pentest-owasp-top-10-2025.html</id>
    <summary>Analysis of the new OWASP Top 10 categories, focused on BOLA, SSRF and Software Supply Chain. Field notes from a team that runs pentests every week.</summary>
    <content type="html"><![CDATA[<p>The <strong>OWASP Top 10</strong> is the reference framework for web application security. The 2025 revision introduces meaningful shifts from the 2021 edition | new categories, re-ranked priorities and explicit coverage of API-first scenarios.</p>
<p>This is an operational read, not a copy of the official docs. Here we share what we've actually seen on <strong>800+ SPECTROSEC engagements</strong>.</p>
<h2>What's new</h2>
<h3>A01:2025 | Broken Access Control</h3>
<p>Stays at #1. <strong>93% of SPECTROSEC pentests</strong> find at least one finding in this category. The common patterns in 2026:</p>
<ul>
<li><strong>BOLA</strong> (Broken Object Level Authorization) on REST APIs | <code>/api/users/123/orders</code> where <code>123</code> is trivially manipulable</li>
<li><strong>Tenant isolation</strong> broken in B2B multi-tenant SaaS</li>
<li><strong>JWT with client-side claims</strong> manipulation (<code>role: user</code> → <code>role: admin</code>)</li>
</ul>
<h3>A02:2025 | Cryptographic Failures</h3>
<p>Emphasis shift: less &quot;weak TLS&quot; (everyone's on TLS 1.3 now), more &quot;<strong>sensitive data at rest</strong>&quot;:</p>
<ul>
<li>Unencrypted databases</li>
<li>Hardcoded keys in binaries</li>
<li>Tokens printed in structured logs</li>
</ul>
<h3>A10:2025 | Server-Side Request Forgery (SSRF)</h3>
<p>Promoted to a dedicated category. Critical in cloud environments where SSRF chains into <strong>IMDS</strong> (Instance Metadata Service) to steal temporary IAM credentials.</p>
<h2>What we test in a SPECTROSEC assessment</h2>
<p>For every category we keep an <strong>operational checklist</strong> with tools and payloads:</p>
<pre><code>Category               Primary tools               Quick win
---------              ---------------             ---------
Broken Access Ctrl    Burp + Autorize              ID substitution
SQL Injection         sqlmap, Burp Intruder        Time-based payload
XSS                   XSStrike, Burp               Polyglot payload
SSRF                  SSRFmap, Burp Collaborator   Blind SSRF out-of-band
Supply Chain          OSV-Scanner, Syft            CVEs in dependencies
</code></pre>
<h2>Why compliance isn't enough</h2>
<p>Passing an OWASP audit doesn't mean you're secure. Real attackers don't follow a checklist | they <strong>chain</strong> 3-4 &quot;medium&quot; vulnerabilities into &quot;critical&quot; access.</p>
<p>In our most recent engagement we chained: <strong>IDOR → JWT manipulation → SSRF → IMDS → full cloud takeover</strong>. Each finding scored CVSS 5-6. The chain scored CVSS 10.</p>
<blockquote>
<p>The value of a SPECTROSEC pentest is not finding 10 isolated bugs. It's showing how 3 of them become an incident report.</p>
</blockquote>
<h2>Next step</h2>
<p>If you run a web application or API in production, an <strong>OWASP Top 10 assessment</strong> takes 5-10 business days, starting at €2,500. The report includes:</p>
<ul>
<li>Findings ranked by CVSS 3.1</li>
<li>Proof of concept with screenshots and payloads</li>
<li>Remediation guide prioritized by business impact</li>
<li>90-day retest guarantee</li>
</ul>
<p><a href="/en/contatti.html">Request an assessment →</a></p>
]]></content>
  </entry>
  
</feed>
