#api-security

[ follow ]
#cybersecurity
Privacy professionals
fromTechCrunch
4 weeks ago

Exclusive: Cybersecurity firm APIsec confirms security lapse exposed customer data

APIsec's internal database was exposed online without a password, revealing sensitive customer data for days.
Tech industry
fromIT Pro
5 days ago

Criminals target APIs as web attacks skyrocket globally

API attacks surged in 2024, representing a major security threat with 311 billion web attacks noted globally.
Information security
fromThe Hacker News
6 months ago

Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually

Organizations are losing between $94 - $186 billion annually due to insecure APIs and bot abuse, with risks increasing exponentially.
Privacy professionals
fromTechCrunch
4 weeks ago

Exclusive: Cybersecurity firm APIsec confirms security lapse exposed customer data

APIsec's internal database was exposed online without a password, revealing sensitive customer data for days.
Tech industry
fromIT Pro
5 days ago

Criminals target APIs as web attacks skyrocket globally

API attacks surged in 2024, representing a major security threat with 311 billion web attacks noted globally.
Information security
fromThe Hacker News
6 months ago

Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually

Organizations are losing between $94 - $186 billion annually due to insecure APIs and bot abuse, with risks increasing exponentially.
more#cybersecurity
#application-security
fromTechzine Global
1 week ago
Software development

Snyk launches API & Web to revamp DAST

APIs are crucial in connecting LLMs and applications, presenting security risks in AI software development.
fromThe Hacker News
9 months ago
Information security

6 Types of Applications Security Testing You Must Know About

A proactive and holistic application security strategy is crucial to secure applications across different phases of development and deployment.
fromThe Hacker News
9 months ago
Information security

6 Types of Applications Security Testing You Must Know About

A proactive and holistic application security strategy is crucial to secure applications across different phases of development and deployment.
more#application-security
#web-development
fromLogRocket Blog
3 months ago
JavaScript

Using Firebase for ASP.NET authentication - LogRocket Blog

Integrating Firebase with ASP.NET provides a comprehensive solution for secure web application authentication.
fromHackernoon
2 years ago
JavaScript

Mastering CORS in .NET: 10 Expert Tips for Secure API Configuration | HackerNoon

CORS is essential for API security, limiting access to defined domains and methods.
fromLogRocket Blog
3 months ago
JavaScript

Using Firebase for ASP.NET authentication - LogRocket Blog

Integrating Firebase with ASP.NET provides a comprehensive solution for secure web application authentication.
fromHackernoon
2 years ago
JavaScript

Mastering CORS in .NET: 10 Expert Tips for Secure API Configuration | HackerNoon

CORS is essential for API security, limiting access to defined domains and methods.
more#web-development
fromSofa-rockers
5 months ago
JavaScript

Publishing to PyPI with a Trusted Publisher from GitLab CI/CD

Using Trusted Publishers significantly enhances security by managing API token risks effectively.
fromDevOps.com
5 months ago
DevOps

5 Key Policies to Strengthen Runtime API Governance - DevOps.com

Effective API runtime governance is essential for ensuring performance, security, and alignment with evolving demands.
fromSecuritymagazine
6 months ago

How organizations can defend against the increasing API attack surface

APIs present increasing security challenges, necessitating heightened protection measures as their use expands in various business environments.
Information security
fromDevOps.com
6 months ago
Information security

Elevating DevOps Security: Why Integrating Threat Modeling Transforms Pentesting - DevOps.com

Compliance-driven pentesting often fails to address evolving vulnerabilities in modern software and API environments.
fromHackernoon
4 years ago
JavaScript

Building Asset and Risk Management on Codebase with Semgrep | HackerNoon

Microservices' structure increases risk due to multiple API handlers and external client interactions, necessitating robust vulnerability assessments.
fromHackernoon
2 years ago
Information security

Code Smell 270 - Boolean APIs | HackerNoon

Replace boolean security flags in APIs with separate endpoints for improved security and maintenance.
fromCodeProject
7 months ago
Information security

How to Secure APIs in Microservices with Spring Boot

API security in microservices focuses on protecting data and communications through various practices such as authentication and encryption.
#data-breaches
fromITPro
8 months ago
Information security

The top API risks of 2024 and how to mitigate them

APIs are vital in digital interactions but pose severe security risks if not properly managed.
fromITPro
8 months ago
Information security

The top API risks of 2024 and how to mitigate them

APIs are vital in digital interactions but pose severe security risks if not properly managed.
more#data-breaches
fromITPro
9 months ago
Information security

Twilio warns Authy users of imminent social engineering attacks after hackers got hold of phone numbers

Twilio Authy faced a security breach where threat actors acquired phone numbers, emphasizing the importance of securing API endpoints.
fromDevOps.com
10 months ago
Information security

FireTail Unveils Free Access for All to Cutting-Edge API Security Platform - DevOps.com

FireTail offers a free version of its enterprise-level API security tools, accessible to developers and organizations of any size.
fromTheregister
10 months ago
JavaScript

Patch now: 'Easy-to-exploit' RCE in open source Ollama

A vulnerability in Ollama allowed remote code execution, affecting over 1,000 instances. Wiz Research disclosed CVE-2024-37032, fixed in version 0.1.34.
Ollama's vulnerability stemmed from insufficient validation on the server side of its REST API, enabling attackers to trigger API endpoints for remote code execution.
fromTechRepublic
10 months ago
Information security

Managing Cloud Security Posture: Continuous Monitoring and Hardening for Visibility and Compliance | TechRepublic

Cloud adoption is increasing, but so are cloud security risks, requiring strong Cloud Security Posture Management (CSPM) practices.
[ Load more ]