API attacks
TOP 5 OWASP API Attacks in 2023
API Attacks have become common these days in the cyber world. APIs (Application Programming Interfaces) have become an essential element of contemporary software development. In today’s advanced world, facilitating seamless communication and ...
5 Best Practices to Keep Your APIs Safe
While we’re working away on an application, APIs are seamlessly, smoothly and invisibly accomplishing a variety of tasks behind the scenes, like pulling up data you’ve requested from another application while you’re ...
API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods
Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently part of the OWASP Top 10 Web Application Vulnerabilities. They. The post ...
API Security: Authorization, Rate Limiting, and Twelve Ways to Protect APIs
41% of organizations suffered an API security incident. Here are 12 methods that you need to incorporate in order to secure and protect APIs. The post API Security: Authorization, Rate Limiting, and ...
What’s New in OWASP API Top 10 2023: The Latest Changes and Enhancements
The OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks. Here is updated OWASP API Top 10 2023 RC List. The post ...
API Attacks Rise 400% in Last Six Months
Attacks on APIs continue to rise sharply. New findings from Salt Labs found a shocking 400% increase in unique API attackers in the last six months. Interestingly, the report also discovered that ...
23 Most Notorious Hacks History that Fall Under OWASP Top 10
What were the most notorious hacks in history? They’re subject to debate, but we bring you 27 of them, which would be strong candidates for the title. The post 23 Most Notorious ...
API4:2019 – Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods
Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When the app/ API doesn't have properly defined limits for API calls and resources that ...
API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods
API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive data. The post API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, ...
API Security: A Complete Guide
We as consumers may not realize it, but APIs have revolutionized how we live and work, driving innovation and making it easier to use software in our day-to-day lives. Our society has ...