#api-security

[ follow ]
#cybersecurity
Privacy professionals
fromTechCrunch
1 month ago

Exclusive: Cybersecurity firm APIsec confirms security lapse exposed customer data

APIsec's internal database was exposed online without a password, revealing sensitive customer data for days.
Tech industry
fromIT Pro
2 weeks ago

Criminals target APIs as web attacks skyrocket globally

API attacks surged in 2024, representing a major security threat with 311 billion web attacks noted globally.
Information security
fromThe Hacker News
7 months ago

Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually

Organizations are losing between $94 - $186 billion annually due to insecure APIs and bot abuse, with risks increasing exponentially.
Privacy professionals
fromTechCrunch
1 month ago

Exclusive: Cybersecurity firm APIsec confirms security lapse exposed customer data

APIsec's internal database was exposed online without a password, revealing sensitive customer data for days.
Tech industry
fromIT Pro
2 weeks ago

Criminals target APIs as web attacks skyrocket globally

API attacks surged in 2024, representing a major security threat with 311 billion web attacks noted globally.
Information security
fromThe Hacker News
7 months ago

Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually

Organizations are losing between $94 - $186 billion annually due to insecure APIs and bot abuse, with risks increasing exponentially.
more#cybersecurity
#application-security
fromTechzine Global
2 weeks ago
Software development

Snyk launches API & Web to revamp DAST

APIs are crucial in connecting LLMs and applications, presenting security risks in AI software development.
fromThe Hacker News
9 months ago
Information security

6 Types of Applications Security Testing You Must Know About

A proactive and holistic application security strategy is crucial to secure applications across different phases of development and deployment.
fromThe Hacker News
9 months ago
Information security

6 Types of Applications Security Testing You Must Know About

A proactive and holistic application security strategy is crucial to secure applications across different phases of development and deployment.
more#application-security
fromDevOps.com
7 months ago
Information security

Elevating DevOps Security: Why Integrating Threat Modeling Transforms Pentesting - DevOps.com

Compliance-driven pentesting often fails to address evolving vulnerabilities in modern software and API environments.
fromHackernoon
4 years ago
JavaScript

Building Asset and Risk Management on Codebase with Semgrep | HackerNoon

Microservices' structure increases risk due to multiple API handlers and external client interactions, necessitating robust vulnerability assessments.
fromHackernoon
2 years ago
Information security

Code Smell 270 - Boolean APIs | HackerNoon

Replace boolean security flags in APIs with separate endpoints for improved security and maintenance.
fromCodeProject
8 months ago
Information security

How to Secure APIs in Microservices with Spring Boot

API security in microservices focuses on protecting data and communications through various practices such as authentication and encryption.
fromITPro
8 months ago
Information security

The top API risks of 2024 and how to mitigate them

APIs are vital in digital interactions but pose severe security risks if not properly managed.
fromITPro
10 months ago
Information security

Twilio warns Authy users of imminent social engineering attacks after hackers got hold of phone numbers

Twilio Authy faced a security breach where threat actors acquired phone numbers, emphasizing the importance of securing API endpoints.
fromTheregister
10 months ago
JavaScript

Patch now: 'Easy-to-exploit' RCE in open source Ollama

A vulnerability in Ollama allowed remote code execution, affecting over 1,000 instances. Wiz Research disclosed CVE-2024-37032, fixed in version 0.1.34.
Ollama's vulnerability stemmed from insufficient validation on the server side of its REST API, enabling attackers to trigger API endpoints for remote code execution.
fromTechRepublic
10 months ago
Information security

Managing Cloud Security Posture: Continuous Monitoring and Hardening for Visibility and Compliance | TechRepublic

Cloud adoption is increasing, but so are cloud security risks, requiring strong Cloud Security Posture Management (CSPM) practices.
[ Load more ]