 June 14, 2023
June 14, 2023 11  min Read
  11  min ReadWhat’s New in OWASP API Top 10 2023: The Latest Changes and Enhancements
The OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks. Here is updated OWASP API Top 10 2023 RC List.
Read the Latest State of Application Security Report (H1 2025) and Stay Ahead of Threats: Download now!
 June 14, 2023
June 14, 2023 11  min Read
  11  min ReadThe OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks. Here is updated OWASP API Top 10 2023 RC List.
 June 7, 2023
June 7, 2023 6  min Read
  6  min ReadAppTrana’s Self Service Rules empower you to take control, allowing you to create, view, and manage the custom rules all by yourself!
 June 2, 2023
June 2, 2023 4  min Read
  4  min ReadA zero-day vulnerability, denoted by the CVE identifier CVE-2023-30777, exposes a dangerous reflected cross-site scripting (XSS) flaw
 May 29, 2023
May 29, 2023 6  min Read
  6  min ReadSecurity misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently part of the OWASP Top 10 Web Application Vulnerabilities. They.
 May 29, 2023
May 29, 2023 8  min Read
  8  min ReadThe primary objective of a cybersecurity audit is to identify vulnerabilities, weaknesses, and potential threats in your IT infrastructure.
 May 18, 2023
May 18, 2023 10  min Read
  10  min Read41% of organizations suffered an API security incident. Here are 12 methods that you need to incorporate in order to secure and protect APIs.
 May 16, 2023
May 16, 2023 9  min Read
  9  min ReadBroken function-level authorization vulnerabilities enable unauthorized users to access or execute functions they should not have access to.
 May 8, 2023
May 8, 2023 4  min Read
  4  min ReadA WAAP solution could play a critical role in CI/CD process. It helps protect apps and APIs from threats throughout the entire SDLC.
 May 2, 2023
May 2, 2023 7  min Read
  7  min ReadExcessive data exposure occurs when APIs reveal more fields, data, and information than the client requires through the API response.
 April 19, 2023
April 19, 2023 6  min Read
  6  min ReadCheck out the API Penetration Testing checklist, which outlines how to conduct an effective API security assessment for your organization.
 April 18, 2023
April 18, 2023 6  min Read
  6  min ReadLooking for a web application firewall? Consider these six key consideration to make an informed choice for your web security needs.
 April 7, 2023
April 7, 2023 6  min Read
  6  min ReadFollow this Vulnerability assessment checklist to stop attacks and kickstart your vulnerability assessment process today!


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™