unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
API Gateways and API Protection: What’s the Difference?
Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating...
2024-10-1 23:4:51 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
governance
Deep Dive into the Latest API Security Vulnerabilities in Envoy
‰PNGIHDRΠΟ}έVpHYs%%IR$πsRGB®ΞιgAMA±�όaΜiIDATxμέ”•ε�οωƒ¨BO.Κ5ιIFξ�rΈ•ιΐ…ΐLΦ...
2024-9-27 00:3:55 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
Θ1
jΑ
iΐ
mΎ
6ί
Deep Dive into the Latest API Security Vulnerabilities in Envoy
Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalen...
2024-9-27 00:3:55 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
envoy
crash
kubernetes
destroyed
Chicago API Security Summit 2024
Thank You Chicago!Earlier this week we had the pleasure of hosting a regional API Securit...
2024-9-20 22:1:1 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
howard
lesson
aaron
intentioned
Fundamentals of GraphQL-specific attacks
GraphQL vs REST APIsDevelopers are constantly exploring new technologies that can improve the...
2024-9-14 01:41:9 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
username
security
developers
API Attack Surface: How to secure it and why it matters
Managing an organization’s attack surface is a complex problem involving asset discovery, vuln...
2024-9-4 04:2:21 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
developers
Evolution of Attack Surface Management
The Early Days: Basic Asset ManagementWhile it was not called ASM, the concept of managing at...
2024-8-30 23:52:51 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
monitoring
identify
asset
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic err...
2024-8-20 03:36:15 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
ebpf
cilium
security
cves
Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulne...
2024-8-17 01:40:19 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
quarter
q2
threatstats
Elasticidad de la nube
Descripción general de la elasticidad de la nubeLa flexibilidad es uno de los atributos cardi...
2024-8-7 18:14:41 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
nube
servicios
recursos
cloud
demanda
CIRCIA – Ley de notificación de incidentes cibernéticos para infraestructuras críticas
¿Qué es CIRCIA?CIRCIA, o Cyber Incident Reporting for Critical Infrastructure Act, es una pro...
2024-8-6 21:35:16 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
circia
ley
seguridad
340 secretos JWT débiles que debes revisar en tu código
¿Qué pasa con JWT?El token web JSON, usualmente identificado por sus siglas JWT, brinda un re...
2024-8-2 20:14:57 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
código
secretos
débiles
análisis
Definición de la tríada de la CIA. Ejemplos de confidencialidad, integridad y disponibilidad
Definición de la tríada de la CIAEl Modelo AIC o la Triada AIC es una estrategia clave para a...
2024-8-1 20:42:46 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
datos
protección
cia
sistemas
Falla en la lógica empresarial
¿Qué son las fallas de la lógica empresarial?Las fallas de lógica empresarial, también conoci...
2024-7-31 19:36:3 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
lógica
empresarial
sistema
fallas
usuario
CVE-2024-41110: Once Again, Docker Addresses API Vulnerability That Can Bypass Auth Plugins
SummaryA significant vulnerability (CVE-2024-41110) was recently discovered in Docker Eng...
2024-7-31 02:52:9 | 阅读: 20 |
收藏
|
Wallarm Blog - lab.wallarm.com
authz
v27
v26
flows
Ataque de puerta trasera
We're sorry, but we can't find the page you were looking for. It's probably some thing w...
2024-7-30 18:23:47 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
sorry
meantime
Sistema Automático de Identificación de Huellas Dactilares – AFIS
We're sorry, but we can't find the page you were looking for. It's probably some thing w...
2024-7-29 17:1:7 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
sorry
meantime
How Can Deliberately Flawed APIs Help In Mastering API Security?
In our recent webinar, we delved into the concept of creating an API security playground tail...
2024-7-24 22:3:8 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
damn
github
Two of Wallarm’s Open-source Tools Have Been Accepted into Black Hat Arsenal 2024
We're gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek...
2024-7-19 17:31:27 | 阅读: 2 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gotestwaf
wallarm
arsenal
stickers
Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk
Polyfill.io helps web developers achieve cross-browser compatibility by automatically managin...
2024-7-10 13:50:5 | 阅读: 12 |
收藏
|
Wallarm Blog - lab.wallarm.com
polyfill
malicious
wallarm
waap
Previous
1
2
3
4
5
6
7
8
Next