API attacks

35 Most Notorious Hacks in History that Fall Under OWASP Top 10

35 Most Notorious Hacks in History that Fall Under OWASP Top 10

What were the most notorious hacks in history? They’re subject to debate, but we bring you 27 of them, which… Read More

4 months ago

What’s New in OWASP API Top 10 2023: The Latest Changes and Enhancements

The OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks.… Read More

11 months ago

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently… Read More

11 months ago

API Security: Authorization, Rate Limiting, and Twelve Ways to Protect APIs

41% of organizations suffered an API security incident. Here are 12 methods that you need to incorporate in order to… Read More

12 months ago

API4:2019 – Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods

Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When the app/… Read More

1 year ago

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive… Read More

1 year ago

Prevent API Exploitation: Know the Unknown, Protect the Unprotected

Almost a year ago, Gartner predicted that API attacks would be the most frequent enterprise attack vector in 2022. Strengthening… Read More

2 years ago