Tag: apis
Broken Function-Level Authorization: What It Is, How We Can Help
No. 5 on the OWASP API Top 10 vulnerabilities list is broken function-level authorization (after...
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MORELack of Resources and Rate Limiting: What It Is, How We Can Help
No. 4 on the OWASP API Top 10 vulnerabilities list is lack of resources and rate limiting (after...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREChallenges of Stopping Bot-Based API Attacks
Bots are increasingly making life more difficult for security teams. Attacks against APIs and web...
VIEW MOREThe Types of API Attacks We Are Seeing
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing...
VIEW MOREHow Attackers Are Using Bots to Breach APIs
APIs have become very popular attack targets, and almost all the attacks we see against API...
VIEW MOREExcessive Data Exposure: What It Is, How We Can Help
No. 3 on the OWASP API Top 10 vulnerabilities list is excessive data exposure (after BOLA and...
VIEW MOREDiscovering and Protecting GraphQL APIs
What’s the difference between GraphQL and REST API endpoints? GraphQL is a structured...
VIEW MORESmarter Not Harder: 3 Ways API Analytics Can Help Application Owners
Software development is fraught with risk — misunderstood requirements, rapidly evolving...
VIEW MOREBroken User Authentication: What It Is, How We Can Help
No. 2 on the OWASP Top 10 List of Critical API Security Risks, broken user authentication is both a...
VIEW MOREOpen Banking Forcing Prioritization of API Protection
Growth of Open Banking Open Banking Project is an open-source system that allows financial...
VIEW MORE