unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Taming API Sprawl: Best Practices for API Discovery and Management
APIs are the backbone of interconnected applications, enabling organizations to innovate, int...
2024-11-18 17:38:58 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
sprawl
security
wallarm
development
operational
Your AppSec Journey Demystified: Driving Effective API Security with Wallarm and StackHawk
There is no doubt that attackers have shifted their attention to APIs. Wallarm’s API ThreatSt...
2024-11-13 23:23:44 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
stackhawk
proactive
development
Context is King: Using API Sessions for Security Context
There’s no doubt that API security is a hot topic these days. The continued growth in API-rel...
2024-11-13 03:9:10 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
threats
wallarm
malicious
orders
The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen...
2024-11-11 18:52:37 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
costs
regulatory
impacts
attackers
AI-Powered APIs: Expanding Capabilities and Attack Surfaces
AI and APIs have a symbiotic relationship. APIs power AI by providing the necessary data and...
2024-11-7 17:26:9 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
attackers
threats
Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale
In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices tha...
2024-11-4 18:45:0 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
docusign
malicious
invoices
attackers
phishing
How to Mitigate the Latest API Vulnerability in FortiManager
Overview of the FortiManager API VulnerabilityRecently, a critical API vulnerability in F...
2024-10-30 21:4:43 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
fortigate
cloud
fgfm
Reducing False Positives in API Security: Advanced Techniques Using Machine Learning
False positives in API security are a serious problem, often resulting in wasted results and...
2024-10-25 20:9:47 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
positives
security
wallarm
machine
threats
How Security Edge Revolutionizes API Security
Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of tra...
2024-10-24 20:21:57 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
cdns
wallarm
threats
brings
Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security
Passwordless authentication for end users is taking the world by storm, offering organization...
2024-10-18 18:29:58 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
openapi
Choosing the Right Deployment Option for Your API Security Solution
You need an API security solution. That much is a given (although some may argue it isn’t!)....
2024-10-9 15:19:14 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
threats
choosing
network
API Gateways and API Protection: What’s the Difference?
Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating...
2024-10-1 23:4:51 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
governance
Deep Dive into the Latest API Security Vulnerabilities in Envoy
‰PNGIHDRΠΟ}έVpHYs%%IR$πsRGB®ΞιgAMA±�όaΜiIDATxμέ”•ε�οωƒ¨BO.Κ5ιIFξ�rΈ•ιΐ…ΐLΦ...
2024-9-27 00:3:55 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
Θ1
jΑ
iΐ
mΎ
6ί
Deep Dive into the Latest API Security Vulnerabilities in Envoy
Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalen...
2024-9-27 00:3:55 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
envoy
crash
kubernetes
destroyed
Chicago API Security Summit 2024
Thank You Chicago!Earlier this week we had the pleasure of hosting a regional API Securit...
2024-9-20 22:1:1 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
howard
lesson
aaron
intentioned
Fundamentals of GraphQL-specific attacks
GraphQL vs REST APIsDevelopers are constantly exploring new technologies that can improve the...
2024-9-14 01:41:9 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
username
security
developers
API Attack Surface: How to secure it and why it matters
Managing an organization’s attack surface is a complex problem involving asset discovery, vuln...
2024-9-4 04:2:21 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
developers
Evolution of Attack Surface Management
The Early Days: Basic Asset ManagementWhile it was not called ASM, the concept of managing at...
2024-8-30 23:52:51 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
monitoring
identify
asset
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic err...
2024-8-20 03:36:15 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
ebpf
cilium
security
cves
Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulne...
2024-8-17 01:40:19 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
quarter
q2
threatstats
Previous
1
2
3
4
5
6
7
8
Next