
The API Protection Blog
ThreatX platform updates, threat research on the latest critical CVEs and 0 days impacting APIs and web applications, alongside strategies and tactics for overcoming the challenges of modern security teams.
Subscribe for API Protection Tactics, Strategy, and Threat Research
Sign up for exclusive threat research, company and content updates, and the occasional fun contest.
- Blog
- Application Security
- Threat Intelligence
- News
- Product Updates
- People & Culture
- Vulnerabilities
- Cloud Security
- API Security
Detailed Look at a Real-World Credential Stuffing Attack
Credential stuffing attacks are becoming increasingly common against organizations of every size in every industry. Just this month, Chick-fi-A revealed it had been the victim of a month’s long credential stuffing attack. Why are these attacks becoming so popular? Because attackers can abuse a compromised account in a variety of ways to commit fraud and […]
VIEW MORE