Category: API Security
How to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are...
VIEW MOREWhat Security Misconfiguration Is, and How We Can Help
No. 8 on the 2023 OWASP API Top 10 vulnerabilities list is security misconfiguration. Vulnerability...
VIEW MOREHow to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MOREDetailed Look at a Real-World Credential Stuffing Event
Credential stuffing attack events are becoming increasingly common against organizations of every...
VIEW MOREHow Much Do You Care About Vendors’ Security?
This morning, ThreatX announced new research focused on the impact companies’ security has on...
VIEW MOREWhy I Joined ThreatX
I was thrilled to join ThreatX as the Chief Revenue Officer a couple months ago because of the...
VIEW MOREThe Evolving MyloBot Botnet
What Is MyloBot? MyloBot is a sophisticated botnet that controls thousands of systems in...
VIEW MOREHow ThreatX Defends Against Multi-Vector API and Application Attacks
We at ThreatX are observing an uptick in multi-vector API and application attacks, or orchestrated...
VIEW MOREOWASP API Security Top 10 2023 Security Risks
As explained by the online community, Open Web Application Security Project (OWASP), APIs are a...
VIEW MOREAttackers, Take the Wheel: API Vulnerabilities Found in 16 Car Brands
The dream of self-driving cars has been around since the days of the Jetsons, Knight Rider, and...
VIEW MOREHow ThreatX Is Protecting Organizations From Attacks, and From Working Weekends
We’re wrapping up our fiscal year here at ThreatX — always a great time to reflect on...
VIEW MORE