
Broken Object Property Level Authorization: What It Is, How We Can Help
Number 3 on the 2023 OWASP API Security Top 10 list, Broken Object Property Level Authorization is...
VIEW MOREHow eBPF Addresses the Challenges of Runtime Threats
Runtime threats aren’t new, and runtime protection is not a new concept. But it’s been plagued...
VIEW MOREWhy Visibility Beyond HTTP Is Key to Securing APIs and Apps
The acceleration of digital transformation initiatives and subsequent rise in API,...
VIEW MOREWhy Is Runtime API and Application Protection Important?
We recently unveiled our latest advancement in the evolution of API and application protection –...
VIEW MOREWhat Security Misconfiguration Is, and How We Can Help
No. 8 on the 2023 OWASP API Top 10 vulnerabilities list is security misconfiguration. Vulnerability...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MORECredential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MOREA Look at a Few Real-World Multi-Vector API & Web Application Attacks
We at ThreatX are observing an uptick in multi-vector API and web application attacks, or...
VIEW MOREWhat is Mass Assignment: How We Can Help
2023 UPDATE: In the 2023 OWASP API Top 10 vulnerabilities list, Excessive Data Exposure and Mass...
VIEW MOREDeconstructing API Attacks
Over the last couple of decades, attackers have built up a sizeable arsenal of tools, techniques,...
VIEW MOREThe Best Way to Combat Bot-Based API Attacks
When defending APIs against botnet attacks, the goal is to make it too inconvenient and expensive...
VIEW MOREBroken Function-Level Authorization: What It Is, How We Can Help
No. 5 on the 2023 OWASP API Top 10 vulnerabilities list is broken function-level authorization....
VIEW MORE