unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Is API Abuse Different from Web Application Attacks by Bots?
API abuse and web application bot attacks are often confused. This is understandable, as both...
2024-11-27 21:6:57 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
wallarm
security
attackers
bots
Taming API Sprawl: Best Practices for API Discovery and Management
APIs are the backbone of interconnected applications, enabling organizations to innovate, int...
2024-11-18 17:38:58 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
sprawl
security
wallarm
development
operational
Your AppSec Journey Demystified: Driving Effective API Security with Wallarm and StackHawk
There is no doubt that attackers have shifted their attention to APIs. Wallarm’s API ThreatSt...
2024-11-13 23:23:44 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
stackhawk
proactive
development
Context is King: Using API Sessions for Security Context
There’s no doubt that API security is a hot topic these days. The continued growth in API-rel...
2024-11-13 03:9:10 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
threats
wallarm
malicious
orders
The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen...
2024-11-11 18:52:37 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
costs
regulatory
impacts
attackers
AI-Powered APIs: Expanding Capabilities and Attack Surfaces
AI and APIs have a symbiotic relationship. APIs power AI by providing the necessary data and...
2024-11-7 17:26:9 | 阅读: 2 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
attackers
threats
Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale
In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices tha...
2024-11-4 18:45:0 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
docusign
malicious
invoices
attackers
phishing
How to Mitigate the Latest API Vulnerability in FortiManager
Overview of the FortiManager API VulnerabilityRecently, a critical API vulnerability in F...
2024-10-30 21:4:43 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
fortigate
cloud
fgfm
Reducing False Positives in API Security: Advanced Techniques Using Machine Learning
False positives in API security are a serious problem, often resulting in wasted results and...
2024-10-25 20:9:47 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
positives
security
wallarm
machine
threats
How Security Edge Revolutionizes API Security
Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of tra...
2024-10-24 20:21:57 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
cdns
wallarm
threats
brings
Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security
Passwordless authentication for end users is taking the world by storm, offering organization...
2024-10-18 18:29:58 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
openapi
Choosing the Right Deployment Option for Your API Security Solution
You need an API security solution. That much is a given (although some may argue it isn’t!)....
2024-10-9 15:19:14 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
threats
choosing
network
API Gateways and API Protection: What’s the Difference?
Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating...
2024-10-1 23:4:51 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
governance
Deep Dive into the Latest API Security Vulnerabilities in Envoy
‰PNGIHDRΠΟ}έVpHYs%%IR$πsRGB®ΞιgAMA±�όaΜiIDATxμέ”•ε�οωƒ¨BO.Κ5ιIFξ�rΈ•ιΐ…ΐLΦ...
2024-9-27 00:3:55 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
Θ1
jΑ
iΐ
mΎ
6ί
Deep Dive into the Latest API Security Vulnerabilities in Envoy
Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalen...
2024-9-27 00:3:55 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
envoy
crash
kubernetes
destroyed
Chicago API Security Summit 2024
Thank You Chicago!Earlier this week we had the pleasure of hosting a regional API Securit...
2024-9-20 22:1:1 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
howard
lesson
aaron
intentioned
Fundamentals of GraphQL-specific attacks
GraphQL vs REST APIsDevelopers are constantly exploring new technologies that can improve the...
2024-9-14 01:41:9 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
username
security
developers
API Attack Surface: How to secure it and why it matters
Managing an organization’s attack surface is a complex problem involving asset discovery, vuln...
2024-9-4 04:2:21 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
developers
Evolution of Attack Surface Management
The Early Days: Basic Asset ManagementWhile it was not called ASM, the concept of managing at...
2024-8-30 23:52:51 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
monitoring
identify
asset
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic err...
2024-8-20 03:36:15 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
ebpf
cilium
security
cves
Previous
-34
-33
-32
-31
-30
-29
-28
-27
Next