unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
API Security Is At the Center of OpenAI vs. DeepSeek Allegations
With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security...
2025-1-29 19:2:10 | 阅读: 24 |
收藏
|
Wallarm Blog - lab.wallarm.com
openai
security
wallarm
deepseek
scraping
API Security’s Role in Responsible AI Deployment
By now, you will almost certainly be aware of the transformative impact artificial intelligen...
2025-1-21 09:28:38 | 阅读: 30 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
threats
encryption
Considerations for Selecting the Best API Authentication Option
Implementing API authentication is one of the most critical stages of API design and developm...
2025-1-20 07:7:14 | 阅读: 22 |
收藏
|
Wallarm Blog - lab.wallarm.com
jwts
security
client
expiration
Effective API Throttling for Enhanced API Security
APIs are the backbone of modern digital ecosystems, but their misuse can expose systems to cy...
2025-1-8 13:47:15 | 阅读: 19 |
收藏
|
Wallarm Blog - lab.wallarm.com
throttling
security
limiting
ensuring
wallarm
Top Open Source API Security Tools
The modern world relies on Application Programming Interfaces (APIs). They allow applications...
2024-12-23 10:13:1 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gotestwaf
cloud
threats
Top Tool Capabilities to Prevent AI-Powered Attacks
Recent advances in AI technologies have granted organizations and individuals alike unprecede...
2024-12-11 22:19:57 | 阅读: 17 |
收藏
|
Wallarm Blog - lab.wallarm.com
identify
deepfake
security
phishing
Protecting Against Bot-Enabled API Abuse
APIs have become the backbone of modern digital ecosystems, powering everything from mobile a...
2024-12-4 21:19:15 | 阅读: 26 |
收藏
|
Wallarm Blog - lab.wallarm.com
scraping
security
wallarm
bots
attackers
How Is API Abuse Different from Web Application Attacks by Bots?
API abuse and web application bot attacks are often confused. This is understandable, as both...
2024-11-27 21:6:57 | 阅读: 26 |
收藏
|
Wallarm Blog - lab.wallarm.com
wallarm
security
attackers
bots
Taming API Sprawl: Best Practices for API Discovery and Management
APIs are the backbone of interconnected applications, enabling organizations to innovate, int...
2024-11-18 17:38:58 | 阅读: 33 |
收藏
|
Wallarm Blog - lab.wallarm.com
sprawl
security
wallarm
development
operational
Your AppSec Journey Demystified: Driving Effective API Security with Wallarm and StackHawk
There is no doubt that attackers have shifted their attention to APIs. Wallarm’s API ThreatSt...
2024-11-13 23:23:44 | 阅读: 16 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
stackhawk
proactive
development
Context is King: Using API Sessions for Security Context
There’s no doubt that API security is a hot topic these days. The continued growth in API-rel...
2024-11-13 03:9:10 | 阅读: 19 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
threats
wallarm
malicious
orders
The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen...
2024-11-11 18:52:37 | 阅读: 22 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
costs
regulatory
impacts
attackers
AI-Powered APIs: Expanding Capabilities and Attack Surfaces
AI and APIs have a symbiotic relationship. APIs power AI by providing the necessary data and...
2024-11-7 17:26:9 | 阅读: 15 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
attackers
threats
Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale
In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices tha...
2024-11-4 18:45:0 | 阅读: 24 |
收藏
|
Wallarm Blog - lab.wallarm.com
docusign
malicious
invoices
attackers
phishing
How to Mitigate the Latest API Vulnerability in FortiManager
Overview of the FortiManager API VulnerabilityRecently, a critical API vulnerability in F...
2024-10-30 21:4:43 | 阅读: 19 |
收藏
|
Wallarm Blog - lab.wallarm.com
fortigate
cloud
fgfm
Reducing False Positives in API Security: Advanced Techniques Using Machine Learning
False positives in API security are a serious problem, often resulting in wasted results and...
2024-10-25 20:9:47 | 阅读: 14 |
收藏
|
Wallarm Blog - lab.wallarm.com
positives
security
wallarm
machine
threats
How Security Edge Revolutionizes API Security
Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of tra...
2024-10-24 20:21:57 | 阅读: 16 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
cdns
wallarm
threats
brings
Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security
Passwordless authentication for end users is taking the world by storm, offering organization...
2024-10-18 18:29:58 | 阅读: 14 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
openapi
Choosing the Right Deployment Option for Your API Security Solution
You need an API security solution. That much is a given (although some may argue it isn’t!)....
2024-10-9 15:19:14 | 阅读: 19 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
threats
choosing
network
API Gateways and API Protection: What’s the Difference?
Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating...
2024-10-1 23:4:51 | 阅读: 19 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
governance
Previous
3
4
5
6
7
8
9
10
Next