Cybersecurity firm Salt Labs discovered a GraphQL API authorization vulnerability in a large B2B financial technology platform. It would give attackers the ability to submit unauthorized transactions ...
A network access service developed by Zscaler (Nasdaq: ZS) has received a provisional authorization to operate at impact level 5 from the Department of Defense as confirmed by a DOD Cloud Computing ...
Jason Kent, hacker-in-residence at Cequence, talks about how cybercriminals target apps and how to thwart them. Application programming interfaces (APIs) have become the glue that holds today’s apps ...
According to a report released by Akamai earlier this year, API calls now represent 83% of all web traffic. Web-enabled applications already have 40% of their attack surface in the form of APIs ...
Application Programming Interfaces (APIs) are the backbone of many services and applications, enabling different software to interact with each other seamlessly. However, with this increased ...
Security vulnerabilities in the application programming interfaces (APIs) powering modern digital services and applications have emerged as a major threat to enterprise systems and data. A recent ...
First unified, single-pane-of-glass platform to deliver real-time detection and mitigation of API threats, including Broken Object Level Authorization (BOLA) and other advanced business logic threats ...
Australian energy company Jemena has been using APIs, in some form, for about a decade. Its use of APIs — application programming interfaces — has jumped recently and is expected to increase fivefold ...
LAS VEGAS--(BUSINESS WIRE)--Noname Security, the API security company, and Alissa Knight, Partner at Knight Ink and recovering hacker, today announced at Money 20/20 new research, “Scorched Earth: ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results