Category: API Security
ThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREWhy Is Runtime API and Application Protection Important?
We recently unveiled our latest advancement in the evolution of API and application protection –...
VIEW MOREHow to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are...
VIEW MOREWhat Security Misconfiguration Is, and How We Can Help
No. 7 on the OWASP API Top 10 vulnerabilities list is security misconfiguration (after BOLA, broken...
VIEW MOREHow to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MOREDetailed Look at a Real-World Credential Stuffing Event
Credential stuffing attack events are becoming increasingly common against organizations of every...
VIEW MOREHow Much Do You Care About Vendors’ Security?
This morning, ThreatX announced new research focused on the impact companies’ security has on...
VIEW MOREWhy I Joined ThreatX
I was thrilled to join ThreatX as the Chief Revenue Officer a couple months ago because of the...
VIEW MOREThe Evolving MyloBot Botnet
What Is MyloBot? MyloBot is a sophisticated botnet that controls thousands of systems in...
VIEW MOREHow ThreatX Defends Against Multi-Vector API and Application Attacks
We at ThreatX are observing an uptick in multi-vector API and application attacks, or orchestrated...
VIEW MOREOWASP API Security Top 10 2023 Release Candidate Published
As explained by the online community, Open Web Application Security Project (OWASP), APIs are a...
VIEW MORE