
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Blog - Shellvoide | Bridging voids in Enterprise Security | Certified Cybersecurity Services</title>
      <link>https://shellvoide.com/blog/blog</link>
      <description>Welcome to our blog. Here we share our thoughts and insights on cybersecurity, technology, and more. You can get in touch with us for any cybersecurity needs at info@shellvoide.com</description>
      <language>en-us</language>
      <managingEditor>info@shellvoide.com (Shellvoide)</managingEditor>
      <webMaster>info@shellvoide.com (Shellvoide)</webMaster>
      <lastBuildDate>Mon, 30 Mar 2026 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://shellvoide.com/blog/tags/jwt-security/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://shellvoide.com/blog/blog/api-pentesting-checklist-what-most-teams-miss</guid>
    <title>API Pentesting Checklist: What Most Teams Miss</title>
    <link>https://shellvoide.com/blog/blog/api-pentesting-checklist-what-most-teams-miss</link>
    <description>Complete API pentesting checklist with OWASP API Top 10 (2023), BOLA/IDOR tests, JWT and OAuth checks, GraphQL security testing, SSRF payloads, business logic abuse scenarios, and reporting guidance.</description>
    <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
    <author>info@shellvoide.com (Shellvoide)</author>
    <category>api-security</category><category>api-pentesting-checklist</category><category>owasp-api-top-10</category><category>graphql-security</category><category>rest-api-security</category><category>jwt-security</category><category>idor</category><category>appsec</category>
  </item>

  <item>
    <guid>https://shellvoide.com/blog/blog/jwt-attacks-in-the-wild-from-decode-to-exploit</guid>
    <title>JWT Security Guide: Common JWT Vulnerabilities, Attacks, Exploits, and Defenses</title>
    <link>https://shellvoide.com/blog/blog/jwt-attacks-in-the-wild-from-decode-to-exploit</link>
    <description>A practical JWT security guide covering what JWT is, common JWT vulnerabilities, JWT attacks, exploit techniques, and defensive best practices for developers, pentesters, and API security teams.</description>
    <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
    <author>info@shellvoide.com (Shellvoide)</author>
    <category>jwt-security</category><category>api-security</category><category>appsec</category><category>pentesting</category><category>oauth</category><category>authentication</category>
  </item>

    </channel>
  </rss>
