
The API Protection Blog
ThreatX platform updates, threat research on the latest critical CVEs and 0 days impacting APIs and web applications, alongside strategies and tactics for overcoming the challenges of modern security teams.
Subscribe for API Protection Tactics, Strategy, and Threat Research
Sign up for exclusive threat research, company and content updates, and the occasional fun contest.
- Blog
- Application Security
- Threat Intelligence
- News
- Product Updates
- People & Culture
- Vulnerabilities
- Cloud Security
- API Security
Lack of Resources and Rate Limiting: What It Is, How We Can Help
No. 4 on the OWASP API Top 10 vulnerabilities list is lack of resources and rate limiting (after BOLA, broken user authentication, and excessive data exposure). OWASP says of this vulnerability, “Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only […]
VIEW MORE