Tag: api
-
Comprehensive Application and API Protection with Cequence and Vercara
In January of this year, Cequence announced our partnership with Vercara, a leading provider of cloud-based security services. The partnership was mot… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/comprehensive-application-and-api-protection-with-cequence-and-vercara/
-
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
Application programming interfaces (APIs) are the connective tissue behind digital modernization, helping applications and databases exchange data mor… First seen on thehackernews.com Jump to article: thehackernews.com/2024/03/apis-drive-majority-of-internet-traffic.html
-
Hycu uses AI to develop APIs for SaaS application backup
SaaS applications don’t usually come with built-in data protection, but Hycu plans to tackle that gap in the market with AI to generate the connectors… First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366571496/Hycu-uses-AI-to-automate-APIs-for-SaaS-application-backup
-
Security Leaders Acknowledge API Security Gaps Despite Looming Threat
Most decision-makers have experienced API security problems over the past year, yet many haven’t invested in a robust API security strategy, Fastly re… First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fastly-survey-api-security-looming/
-
95% of companies face API security problems
Despite the critical role of APIs, the vast majority of commercial decision-makers are ignoring the burgeoning security risk for businesses, according… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/22/api-security-importance-for-businesses/
-
Workshop >>How to write custom security tests<< Main Takeaways
Tags: apiDiscover the main takeaways from our latest workshop on how to write custom security tests for API security. The post the main takeaways from our lat… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/workshop-how-to-write-custom-security-tests-main-takeaways/
-
Authoring Automated Attacks with ChatGPT (or any Generative AI)
Basic API Interrogation During my time here at Cequence, I have been impressed with the attackers we face. Often, they have almost nothing to go on an… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/authoring-automated-attacks-with-chatgpt-or-any-generative-ai/
-
API environments becoming hotspots for exploitation
A total of 29% of web attacks targeted APIs over 12 months (January through December 2023), indicating that APIs are a focus area for cybercriminals, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/20/apis-risk-exposure-concern/
-
Discovering API secrets endpoints using APKLeaks
Learn how to improve your recon process with the use of apkleaks to find hidden API servers, secrets, and endpoints embedded in mobile apps. The post … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/discovering-api-secrets-endpoints-using-apkleaks/
-
What is API Threat Detection?
API threat detection is one of the critical aspects of API security and is the process of identifying API threats intended to exploit API vulnerabilit… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/what-is-api-threat-detection/
-
Introducing Escape rules Rules that adapt for you
Tags: apiDiscover how Escape rules are the new generation of custom security tests for your API security. The post how Escape rules are the new generation of … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/introducing-escape-rules-rules-that-adapt-for-you/
-
Manage Access Control Lists Easily with Runtime Lists API | Impart Security
Impart Security is proud to introduce Runtime Lists API, a groundbreaking feature designed to streamline how security teams manage Access Control List… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/manage-access-control-lists-easily-with-runtime-lists-api-impart-security/
-
ChatGPT Extensions Could be Exploited to Steal Data and Sensitive Information
API security professionals Salt Security have released new threat research from Salt Labs highlighting critical security flaws within ChatGPT plugins,… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/03/13/chatgpt-extension-could-be-exploited-to-steal-data-and-sensitive-information/
-
Auch Api fährt einen Konsolidierungskurs in schwierigen Distributionszeiten
Tags: apiFirst seen on crn.de Jump to article: www.crn.de/news/4184559/auch-api-ahrt-einen-konsolidierungskurs-schwierigen-distributionszeiten
-
What We Learned from These 3 API Security Breaches
They say, Experience is the best teacher. Well, they never said it had to be your experience. If we look closely, there are lessons to be learned fro… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/03/11/what-we-learned-from-these-3-api-security-breaches/
-
Salt Security, API Posture Governance, and the NIST Cybersecurity Framework 2.0
Securing organizations against today’s most advanced threats continues to be challenging, with APIs (Application Programming Interfaces)playing an inc… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/salt-security-api-posture-governance-and-the-nist-cybersecurity-framework-2-0/
-
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens
Government bodies are clamping down heavily on institutions and organizations that handle sensitive customer data. For APIs, tokens are used to authen… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/top-4-essential-strategies-for-securing-apis-to-block-compromised-tokens/
-
Secure Authenticated Traffic with Integrated JWT Decoding Functions | Impart Security
Tags: apiDecoding JWTs has never been easier! Impart Security is excited to announce the addition of Integrated JWT Decoding Functions to our API security plat… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/secure-authenticated-traffic-with-integrated-jwt-decoding-functions-impart-security/
-
PSD2, the Future of Open Banking, and API Security
Open Banking Has Accelerated the Use of APIs and the Need for API Security The landscape of open banking is rapidly evolving, fueled in no small part… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/psd2-the-future-of-open-banking-and-api-security/
-
Is Nuclei any good for API hacking?
Let me show you how Nuclei can be used for more than vulnerability scanning. Learn how to leverage it as a tool for your API hacking. The post how you… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/is-nuclei-any-good-for-api-hacking/
-
5 ways to keep API integrations secure
API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/06/secure-api-integrations/
-
GitHub push protection now on by default for public repositories
GitHub push protection a security feature aimed at preventing secrets such as API keys or tokens getting accidentally leaked online is being switche… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/04/github-push-protection/
-
What is a Shadow API? Understanding the risks and strategies to prevent their sprawl
Understand main Shadow API risks, and discover powerful strategies to curb Shadow API sprawl effectively. The post nd main Shadow API risks, and disco… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/what-is-a-shadow-api-understanding-the-risks-and-strategies-to-prevent-their-sprawl/
-
How to secure your API secret keys from being exposed?
Learn about the dangers of API secret key exposure and discover our selection of prevention strategies. The post out the dangers of API secret key exp… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/how-to-secure-your-api-secret-keys-from-being-exposed/
-
GitHub enables push protection by default to stop secrets leak
GitHub has enabled push protection by default for all public repositories to prevent accidental exposure of secrets such as access tokens and API keys… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/github-enables-push-protection-by-default-to-stop-secrets-leak/
-
Das müssen CISOs jetzt beachten – 4 große Herausforderungen der API-Sicherheit
First seen on security-insider.de Jump to article: www.security-insider.de/4-grosse-herausforderungen-der-api-sicherheit-a-d8c9078d6341fccab3161434ebc21ddf/
-
Enhancing API Security with JWT Core Detections | Impart Security
Security teams, we hear you. Today we release a few well-chosen JWT-based detections into our core ruleset for more effective API security. Some of th… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/enhancing-api-security-with-jwt-core-detections-impart-security/
-
5 mistakes beginners make during app recon
Tags: apiLearn about the five mistakes beginners make during their app recon that limit their ability to find vulns during their API security testing. The post… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/5-mistakes-beginners-make-during-app-recon/
-
What is API Sprawl? Understanding the growing challenge of 2024 and how to navigate it
Tags: apiDiscover the impact of API sprawl in 2024 and learn how to effectively navigate it with expert insights from our team. The post the impact of API spr… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/what-is-api-sprawl-understanding-the-growing-challenge-of-2024-and-how-to-navigate-it/
-
Hackers Abuse Telegram API To Exfiltrate User Information
Attackers have been using keywords like >>remittance>receipts

