Tag: api
-
Reverse Engineering Electron Apps to Discover APIs
by
in SecurityNewsLearn how to reverse engineer an Electron app to find artifacts like source code and API endpoints, and capture live traffic with Burp Suite. The post… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/reverse-engineering-electron-apps-to-discover-apis/
-
Salt Security Unveils First AI-Infused API Security Platform to Address Proliferation of GenAI Application Development
by
in SecurityNewsThis week, Salt Security, a frontrunner in API security, have unveiled its groundbreaking API Security Protection Platform. This platform, powered by … First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/05/08/salt-security-unveils-first-ai-infused-api-security-platform-to-address-proliferation-of-genai-application-development
-
RSAC 2024 Highlights, Connecting on API Security and Bot Management
by
in SecurityNews
Tags: apiAnother RSAC has wrapped! Thank you to everyone who stopped by our booth to learn how the Cequence Unified API Protection platform’s integrated API se… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/rsac-2024-highlights-connecting-on-api-security-and-bot-management/
-
Dell-Leak: Daten wochenlang über Dell-API abgezogen
by
in SecurityNewsBeim Computerhersteller Dell gab es ein Datenleck, bei dem ein Angreifer Daten von gut 49 Millionen Dell-Kunden abziehen konnte. Das sind wohl Daten a… First seen on borncity.com Jump to article: www.borncity.com/blog/2024/05/11/dell-leak-daten-wochenlang-ber-dell-api-abgezogen/
-
Dell reagierte nicht auf Warnung vor Diebstahl von Kundendaten
by
in SecurityNewsWährend ein Angreifer über eine API von Dell Kundendaten abgriff, schickte er Mails an das Unternehmen. Das reagierte erst, als die Daten veröffentlic… First seen on heise.de Jump to article: www.heise.de/news/Dell-reagierte-nicht-auf-Warnung-vor-Diebstahl-von-Kundendaten-9714977.html
-
Dell API abused to steal 49 million customer records in data breach
by
in SecurityNewsThe threat actor behind the recent Dell data breach revealed they scraped information of 49 million customer records using an partner portal API they … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/
-
CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs
by
in SecurityNewsOur collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also include… First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/ciso-corner-
-
How to build a Copilot for Security API Plugin Part 1
by
in SecurityNews
Tags: apiFirst seen on thesecurityblogger.com Jump to article: www.thesecurityblogger.com/how-to-build-a-copilot-for-security-api-plugin-part-1/
-
Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft
First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/microsoft-graph-api-emerges-as-top-attacker-tool-to-plot-data-theft
-
Shadow APIs: An Overlooked Cyber-Risk for Orgs
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/application-security/shadow-apis-an-overlooked-cyber-risk-for-orgs
-
Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award
by
in SecurityNewsWe are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Excellence Award, under the category Best API Security Produ… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/best-api-security-product-wallarm-wins-2024-cybersecurity-excellence-award/
-
Akamai to Acquire API Protection Startup Noname Security for $450 Million
by
in SecurityNewsAkamai has announced plans to acquire Noname Security to enhance its API protection offering. The post as announced plans to acquire Noname Security t… First seen on securityweek.com Jump to article: www.securityweek.com/akamai-to-acquire-api-protection-startup-noname-security-for-450-million/
-
Enabling GenAI with AI-infused API Security
by
in SecurityNewsGenAI has the promise to transform companies, and introduce a lot of security risk. One of the main benefits of GenAI relates to the modernization of … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/enabling-genai-with-ai-infused-api-security/
-
API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes
by
in SecurityNewsAI is rapidly increasing the pace of API creation within organizations, leading to API security becoming as significant as traditional application sec… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/api-vulnerabilities-found-across-ai-infrastructure-projects-at-nvidia-mercedes/
-
APIContext’s Global Cloud API Performance Report Show A Decline In Cloud API Availability
by
in SecurityNewsAPIContext has unveiled its 2024 Cloud Service Provider API Report, offering an in-depth examination of the performance of leading cloud service provi… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/04/26/apicontexts-global-cloud-api-performance-report-show-a-decline-in-cloud-api-availability
-
Salt Security Enhances API Security Platform with OAuth Protection Package
by
in SecurityNewsSalt Security have announced the release of its new multi-layered OAuth protection package to detect attempts to exploit OAuth and proactively fix vul… First seen on itsecurityguru.org Jump to article: www.itsecurityguru.org/2024/04/25/salt-security-enhances-api-security-platform-with-oauth-protection-package/
-
Attackers evade detection by leveraging Microsoft Graph API
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/attackers-evade-detection-by-leveraging-microsoft-graph-api
-
Hackers Exploit Microsoft Graph API For CC Communications
by
in SecurityNewsAn emerging threat leverages Microsoft’s Graph API to facilitate command-and-control (C&C) communications through Microsoft cloud services. Recent… First seen on gbhackers.com Jump to article: gbhackers.com/hackers-exploit-microsoft-graph-api/
-
Dropbox says attackers accessed customer and MFA info, API keys
by
in SecurityNewsFile hosting service Dropbox has confirmed that attackers have breached the Dropbox Sign production environment and accessed customer personal and aut… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/05/02/dropbox-sign-breached/
-
Attackers steal API keys, OAuth tokens, in Dropbox Sign breach
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/attackers-steal-api-keys-oauth-tokens-in-dropbox-sign-breach
-
Dropbox Sees Breach of Legally Binding E-Signature Service
by
in SecurityNewsAll Dropbox Sign Users’ Emails Stolen, Plus Some MFA and OAuth Tokens, API Keys. Dropbox said hackers breached its infrastructure and stole swaths of … First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/dropbox-sees-breach-legally-binding-e-signature-service-a-24997
-
Traceable AI Raises $30 Million to Safeguard Cloud APIs
by
in SecurityNewsTraceable AI has raised $110 million since launching in 2018 with ambitious plans in the competitive API security and observability space. The post … First seen on securityweek.com Jump to article: www.securityweek.com/traceable-ai-raises-30-million-to-safeguard-cloud-apis/
-
Finding Attack Vectors using API Linting
by
in SecurityNewsLearn how to weaponize developer tools used for API linting to find attack vectors in the APIs you are hacking. The post w to weaponize developer too… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/finding-attack-vectors-using-api-linting/
-
Is API Security Just a Better WAF? | Impart Security
by
in SecurityNewsThe perceptions of the API security market have really shifted since we started Impart Security three years ago. When we first started Impart, API sec… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/is-api-security-just-a-better-waf-impart-security/
-
What is API Security?
by
in SecurityNewsAPI Security: Securing the Building Blocks of Our Interconnected World Today’s world is software-driven and widely interconnected. From banking to soc… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/what-is-api-security-3/
-
Vorlon is trying to stop the next big API breach
by
in SecurityNewsApplication programming interfaces, or APIs as they’re commonly known, are the bedrock of everything we do online. APIs allow two things on the intern… First seen on techcrunch.com Jump to article: techcrunch.com/2024/04/17/cybersecurity-startup-vorlon-funding-api-breach/
-
How to secure GraphQL APIs: challenges and best practices
by
in SecurityNewsDive into the complexities of securing GraphQL APIs and common vulnerabilities and learn best practices for enhancing GraphQL security. The post o the… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/how-to-secure-graphql-apis-challenges-and-best-practices/
-
TensorFlow AI models at risk due to Keras API flaw
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/tensorflow-ai-models-at-risk-due-to-keras-api-flaw
-
Critical Flaw with Popular API Portal Let Attackers Launch SSRF Attacks
by
in SecurityNewsA significant vulnerability in the Perforce Akana Community Manager DeveloperPortal has been found, allowing attackers to conduct server-side request … First seen on gbhackers.com Jump to article: gbhackers.com/critical-flaw-with-api-portal/
-
5 Tips for API Hackers on Picking Your First Target
by
in SecurityNewsCheck out these five tips to help you pick your first target when starting bug bounty hunting against APIs. The post t these five tips to help you pic… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/5-tips-for-api-hackers-on-picking-your-first-target/