API Abuse
Privacy Risks in Google’s New Play Store Personalization
Personolization is a double edged sword. On one hand, it enhances user experiences by offering tailored recommendations, but on the other hand, it raises significant privacy concerns. Google Play's recent announcement about ...
The Rise of Unofficial Apps in Delivery, Automotive, and E-Commerce
Understanding the Security Risks and Solutions for Protecting Sensitive Data There is a trend emerging for anyone launching a consumer business. Almost every business these days does two things: the first is ...
API Transformation Cyber Risks and Survival Tactics
As you think about how to ensure your APIs are within your risk tolerance, ensure that you have a sound understanding of your inventory and the data associated with them ...
How Poor API Security Led to Major Breaches in 2024
Major API Breaches in H1 of 2024 Earlier this year, we provided an overview of the significant security breaches from 2023. It's now clear that for API related breaches, this year is ...
Dell Hell Redux — More Personal Info Stolen by ‘Menelik’
Phish Ahoy! Hacker took advantage of Dell’s lack of anti-scraping defense ...
Introducing Integrated API Abuse Prevention to Combat Bad Bots
In recent years there’s been a rise in “API Abuse” attacks, which includes detrimental automated behaviors such as malicious bots, account takeover (ATO), credential stuffing, application layer (L7) DDoS, data scraping, and ...
ChatGPT Injection: a new type of API Abuse attack may steal your OpenAI API credits
ChatGPT is spreading like wildfire all over the internet, being used in everything from casual tools to cybersecurity and even industrial applications. It’s so popular, I wouldn’t be shocked if it starts ...
What You Need to Know About Broken Object Level Authorization (BOLA)
Photo by Claudel Rheault on Unsplash Broken Object Level Authorization (BOLA) is the #1 vulnerability in the OWASP API Security Project’s API Security Top Ten in 2019. Using BOLA, an attacker exploits ...
Mobile App Security: Uncovering the Risks of Secret Theft at Runtime
This is our second blog highlighting the results of the Approov Threat Lab Report ...
T-Mobile’s SIXTH Breach in 5 years: 37M Users’ PII Leaks
The Un-carrier is In-secure, it seems. Un-believable. In-credibly in-competent. CEO Mike Sievert (pictured) might become un-CEO ...