
Why Is Runtime API and Application Protection Important?
We recently unveiled our latest advancement in the evolution of API and application protection –...
VIEW MOREWhat Security Misconfiguration Is, and How We Can Help
No. 7 on the OWASP API Top 10 vulnerabilities list is security misconfiguration (after BOLA, broken...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MORECredential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MOREA Look at a Few Real-World Multi-Vector API & Web Application Attacks
We at ThreatX are observing an uptick in multi-vector API and web application attacks, or...
VIEW MOREWhat is Mass Assignment: How We Can Help
OWASP says of mass assignment, “Binding client provided data (e.g., JSON) to data models, without...
VIEW MOREDeconstructing API Attacks
Over the last couple of decades, attackers have built up a sizeable arsenal of tools, techniques,...
VIEW MOREThe Best Way to Combat Bot-Based API Attacks
When defending APIs against botnet attacks, the goal is to make it too inconvenient and expensive...
VIEW MOREBroken Function-Level Authorization: What It Is, How We Can Help
No. 5 on the OWASP API Top 10 vulnerabilities list is broken function-level authorization (after...
VIEW MORELack of Resources and Rate Limiting: What It Is, How We Can Help
No. 4 on the OWASP API Top 10 vulnerabilities list is lack of resources and rate limiting (after...
VIEW MOREExcessive Data Exposure: What It Is, How We Can Help
No. 3 on the OWASP API Top 10 vulnerabilities list is excessive data exposure (after BOLA and...
VIEW MOREBroken User Authentication: What It Is, How We Can Help
No. 2 on the OWASP Top 10 List of Critical API Security Risks, broken user authentication is both a...
VIEW MORE