Category: Blog
How Attackers Are Using Bots to Breach APIs
APIs have become very popular attack targets, and almost all the attacks we see against API...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREAPI Protection vs. Security: Getting Started
Recently, I’ve been championing the idea of a “protection-first” approach when it comes to...
VIEW MORENew Research: How Does API Security Affect Consumers?
There’s a lot of talk about APIs and their security, or lack thereof, in the infosec community....
VIEW MORERead the Fine Print: Can’t Block an API Attack? You Can’t Protect
“Can the API security tool you are pitching – on its own – stop (block) API attacks...
VIEW MOREAPI Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORELog4j Update: Threat to Local Hosts – ThreatX Response
Researchers have discovered a new attack vector that may allow an attacker to trigger the Log4j...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MOREWelcome Tom Axbey to the Board of Directors!
I’m thrilled to welcome Tom Axbey to our board of directors. His experience will prove invaluable...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREHow to Simplify WAF Rule Management
As long as web application firewalls (WAFs) have existed, security teams have struggled with tuning...
VIEW MOREWelcome to Our New CMO!
2021 has been a banner year for ThreatX. Our recent funding raise, paired with our inclusion as a...
VIEW MORE