Category: API Security
Lack of Resources and Rate Limiting: What It Is, How We Can Help
NOTE: The 2023 OWASP API Top 10 vulnerabilities list replaced Lack of Resources and Rate Limiting...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREChallenges of Stopping Bot-Based API Attacks
Bots are increasingly making life more difficult for security teams. Attacks against APIs and web...
VIEW MOREThe Types of API Attacks We Are Seeing
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing...
VIEW MOREA Look at Popular Botnets and How to Stop Them
A botnet is simply, as the name implies, a network of bots. Attackers conscript many computers into...
VIEW MOREThreatX Named in 2022 Magic Quadrant™ for Cloud Web App and API Protection for Second Consecutive Year
I am pleased to announce that ThreatX has been recognized by Gartner® in the Magic Quadrant™...
VIEW MOREWhy Do You Need a WAF For Your Websites?
Businesses have to worry about different kinds of cyberattacks, many of which could bring down...
VIEW MOREAn Introduction to API Protection
The acceleration of digital transformation initiatives is fueling API growth. According to Gartner,...
VIEW MOREHow Attackers Are Using Bots to Breach APIs
APIs have become very popular attack targets, and almost all the attacks we see against API...
VIEW MOREThreatX Raises $30 Million in Series B Funding
I am thrilled to announce that ThreatX has raised $30 million in Series B funding, led by Harbert...
VIEW MOREExcessive Data Exposure: What It Is, How We Can Help
2023 UPDATE: In the 2023 OWASP API Top 10 vulnerabilities list, Excessive Data Exposure and Mass...
VIEW MOREDiscovering and Protecting GraphQL APIs
What’s the difference between GraphQL and REST API endpoints? GraphQL is a structured...
VIEW MORE