API security
Evolution of Attack Surface Management
The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began with basic asset management practices in the late 1990s and early 2000s ...
What is Gift Card and Loyalty Program Abuse?
Gift cards and loyalty programs are used by retailers to increase customer traffic, build brand awareness, and gain new customers. However, they also attract the attention of fraudsters who exploit these systems, ...
Strengthening API Security with AppSentinels Integration in the Strobes Platform
APIs are the backbone of apps and cloud services, making everything work seamlessly behind the scenes. But with their power comes a unique set of security challenges that can’t be... The post ...
5 Ways Contrast Security ADR Closes the Cybersecurity Gap for Applications and APIs | Contrast Security
Gazing into your security operations center (SOC) platform, what do you see? ...
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
The Other Crowdstrike Outage On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic error that caused Windows systems to crash, resulting in widespread BSOD ...
Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our latest Q2 ThreatStats™ Report reveals critical trends and developments that are reshaping ...
Ensuring High-Efficacy Zero-Knowledge API Discovery
Most organizations do not have an accurate estimate of their API footprints – and why would they? With the rate at which APIs are getting churned out or updated, it’s a significant ...
Cequence Storms Black Hat with API Security Testing for Generative AI Applications
That’s a wrap for Black Hat 2024! We had a great show and met many of you at the booth or on the show floor. I hope you were able to come ...
Empowering the Shift: From Integration to Innovation in Application Security
Last month, we explored how organizations can reclaim control over their Application Security (AppSec). Building on that discussion, we now delve deeper into the transformative steps necessary for security decision-makers to redefine ...