unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Wallarm Research Releases Nuclei Template to Counter Threats Targeting LLM Apps
Wallarm发布新Nuclei模板检测Model Context Protocol(MCP)暴露风险。MCP由Anthropic开发,用于AI工具连接与交互。暴露服务器易受攻击,允许未认证访问敏感数据。Wallarm提供检测方法和防护措施,并建议团队加强安全以应对AI协议风险。...
2025-4-14 11:56:15 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
mcp
wallarm
prompts
llm
exposure
test
文章探讨了API安全的重要性,并介绍了Wallarm如何通过测试和保护API来确保数据安全和防止潜在攻击。...
2025-4-12 16:49:1 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
exhaustion
mins
Meeting NIST API Security Guidelines with Wallarm
NIST发布指南《云原生系统API保护指南》,提供全面框架以保障云环境中API安全,并推荐工具实现安全控制。Wallarm通过集成多项建议提供一站式云原生解决方案,涵盖API发现、请求验证、敏感数据检测、认证授权及监控等功能。...
2025-4-10 15:16:29 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
wallarm
security
ensuring
monitoring
The API Security Challenge in AI: Preventing Resource Exhaustion and Unauthorized Access
AI代理通过API连接企业系统提升效率和创新,但面临权限过大、攻击面扩大及资源耗尽等安全威胁。Wallarm通过实时威胁检测、智能访问控制和灵活部署方案保护AI代理安全。...
2025-4-10 06:44:42 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
agents
wallarm
attackers
security
threats
Unsolved Challenge: Why API Access Control Vulnerabilities Remain a Major Security Risk
文章探讨了API访问控制漏洞(如BOLA和BFLA)难以检测的原因及其对企业的影响,并介绍了Wallarm如何通过自动化发现、实时流量分析和自适应安全措施来解决这些问题。...
2025-3-31 12:25:48 | 阅读: 2 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
bola
wallarm
AI Agents and API Security: The Hidden Risks Lurking in Your Business Logic
现代组织依赖智能AI提升效率和自动化关键业务功能,但内部API安全隐患可能导致数据泄露和业务中断。攻击者可利用API漏洞绕过安全控制, Wallarm通过API发现、业务逻辑识别和实时监控等技术保护企业免受此类威胁。...
2025-3-26 11:12:17 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
wallarm
security
attackers
agents
malicious
Data Leaks and AI Agents: Why Your APIs Could Be Exposing Sensitive Information
文章探讨了AI在企业中的应用及其带来的安全风险,如数据泄露和API漏洞,并介绍了Wallarm通过API发现、滥用预防和实时威胁缓解等技术保护AI系统的方法。...
2025-3-19 09:23:32 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
agents
security
wallarm
attackers
agentic
One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild
新发现的远程代码执行漏洞CVE-2025-24813利用Apache Tomcat服务器的默认会话机制,通过简单的PUT请求上传恶意序列化文件并触发反序列化,实现完全控制。传统WAF难以检测此攻击,而Wallarm可通过实时解码和深度分析有效防御。...
2025-3-14 03:38:0 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
malicious
attacker
wallarm
wafs
API Specifications: Why, When, and How to Enforce Them
文章介绍了API规范的重要性及其作用。API规范定义了API的结构和行为,包括请求方法、数据格式、认证机制和错误处理等。通过遵循这些规范,可以确保API的一致性、安全性、可维护性和互操作性。文章还详细说明了如何实施和维护API规范,并提到了OpenAPI Specification作为常见示例。...
2025-3-4 13:0:45 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
developers
wallarm
enforce
API Armor: How Bybit’s Real-Time Blacklisting Is Thwarting a $1.5B Crypto Heist
Bybit遭遇15亿美元加密货币盗窃后,利用API创建“黑名单”,追踪可疑钱包地址,并推出赏金计划激励安全专家协作拦截资金。这一创新举措展示了API在现代网络安全中的关键作用。...
2025-2-28 14:13:9 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
bybit
security
threats
funds
DORA: Strengthening Digital Resilience Through API Security
文章介绍了欧盟《数字运营韧性法案》(DORA),旨在加强金融机构的IT安全与运营韧性。该法规要求机构管理ICT风险、进行事件报告与韧性测试,并监督第三方服务提供商。文章强调API安全对合规的重要性,并介绍Wallarm如何帮助机构实现目标。...
2025-2-20 11:51:37 | 阅读: 13 |
收藏
|
Wallarm Blog - lab.wallarm.com
dora
security
ict
resilience
wallarm
Overcoming Security Challenges in Real-Time APIs
实时API通过高效协议实现低延迟数据交换,在直播聊天、金融交易等领域应用广泛。但其持续连接和高数据流特性使其面临访问控制不当、注入攻击等安全风险。采用强认证、输入验证和实时威胁监测等措施可有效降低风险。...
2025-2-14 13:17:11 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
attackers
wallarm
AI Security is API Security: What CISOs and CIOs Need to Know
文章指出,随着人工智能(AI)的普及,API(应用程序编程接口)已成为新的主要攻击目标。研究表明,与AI相关的API漏洞激增了1025%,不安全的身份验证、内存腐败风险和外部威胁暴露等问题日益突出。2024年已证实API成为主要攻击向量。为应对这些挑战,组织需优先考虑API安全,采取包括发现和管理影子API、加强认证和访问控制、嵌入式安全测试等措施。只有通过主动应对这些挑战,才能确保AI驱动的创新不会以牺牲安全性为代价。...
2025-2-7 18:40:37 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
attackers
cisos
cios
Threat Replay Testing: Turning Attackers into Pen Testers
In war, as Sun Tzu taught us, the better you understand your enemy’s tactics (and yourself),...
2025-2-3 09:15:41 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
trt
attackers
replay
Analyzing DeepSeek’s System Prompt: Jailbreaking Generative AI
DeepSeek, a disruptive new AI model from China, has shaken the market, sparking both excitemen...
2025-1-31 15:54:19 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
deepseek
security
openai
jailbreak
ethical
API Security Is At the Center of OpenAI vs. DeepSeek Allegations
With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security...
2025-1-29 19:2:10 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
openai
security
wallarm
deepseek
scraping
API Security’s Role in Responsible AI Deployment
By now, you will almost certainly be aware of the transformative impact artificial intelligen...
2025-1-21 09:28:38 | 阅读: 29 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
threats
encryption
Considerations for Selecting the Best API Authentication Option
Implementing API authentication is one of the most critical stages of API design and developm...
2025-1-20 07:7:14 | 阅读: 16 |
收藏
|
Wallarm Blog - lab.wallarm.com
jwts
security
client
expiration
Effective API Throttling for Enhanced API Security
APIs are the backbone of modern digital ecosystems, but their misuse can expose systems to cy...
2025-1-8 13:47:15 | 阅读: 18 |
收藏
|
Wallarm Blog - lab.wallarm.com
throttling
security
limiting
ensuring
wallarm
Top Open Source API Security Tools
The modern world relies on Application Programming Interfaces (APIs). They allow applications...
2024-12-23 10:13:1 | 阅读: 16 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gotestwaf
cloud
threats
Previous
0
1
2
3
4
5
6
7
Next