Guardians of the Enterprise — Insights from leading cyber experts.

Listen Now →

API attacks

6 articles

← All Articles
How Do APIs Get Hacked? A Developer & DevOps Perspective

How Do APIs Get Hacked? A Developer & DevOps Perspective

Attackers exploit APIs through broken auth, mass assignment, excessive data exposure, and DDoS. Explore prevention techniques to strengthen…

39 Most Notorious Hacks in History that Fall Under OWASP Top 10

39 Most Notorious Hacks in History that Fall Under OWASP Top 10

What were the most notorious hacks in history? They’re subject to debate, but we bring you 27 of…

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

Security misconfigurations are the errors and oversights made during an API's configuration that can lead to security vulnerabilities.

API Security: Authorization, Rate Limiting, and Twelve Ways to Protect APIs

API Security: Authorization, Rate Limiting, and Twelve Ways to Protect APIs

41% of organizations suffered an API security incident. Here are 12 methods that you need to incorporate in…

API4:2019 – Lack  of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods

API4:2019 – Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods

Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When…

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access…