Understanding the OWASP API Security Top 10: Why BOLA is the Number One Risk for APIs

Understanding and addressing vulnerabilities is critical in cybersecurity, where APIs serve as the backbone for seamless data exchange. The OWASP API Security Top 10, revised in 2023, provides a comprehensive guide to ...
Cloudflare Akamai software, engineering, OWASP, organizations, appsec, AppSec Salt Security API security rise GitOps Finite State API APIs tokenization

Salt Security Adds Governance Engine to API Security Platform

Salt Security added a posture governance engine to its API security platform that defines and enforces implementation standards ...
Security Boulevard
Cloudflare ransomware FCC Google mobile Cybersecurity Issues in Mobile App Development

Cloudflare Report Surfaces Lots of API Insecurity

More than 15,000 accounts using Cloudflare had API endpoints that were only discovered using machine learning algorithms ...
Security Boulevard
API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

API Security Takes Center Stage as EU Financial Services Regulations Heat Up

In 2024, financial organizations must secure their APIs, protect their cloud-based applications and improve overall API security ...
Security Boulevard
Biggest iPhone Exploit Ever & Google's $5 Billion Dollar Settlement

Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App

In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The ...
LLM firewall AI

Exposed Hugging Face APIs Opened AI Models to Cyberattacks

Security flaws found in both Hugging Face and GitHub repositories exposed almost 1,700 API tokens, opening up AI developers to supply chain and other attacks and putting a brighter spotlight on the ...
Security Boulevard
Why Azure B2C ROPC Custom Flows Are Inherently Insecure

Why Azure B2C ROPC Custom Flows Are Inherently Insecure

Microsoft’s Azure Active Directory B2C service allows cloud administrators to define custom policies, which orchestrates trust between principals using standard authentication protocols. One such custom policy that B2C defines by default is ...
Securing Human Identities in the Digital Age

Securing Human Identities in the Digital Age

In the fast-paced world of the internet, where every click, every search, and every interaction leaves a digital footprint, the security of human identities has become paramount. Let's delve into the complexities ...
Escape API Security Checklist

Escape API Security Checklist

Are you looking to make your API security program stronger? Our detailed API Security Checklist is here to help ...
AppSec, AI, API app Google application security AppSec

Survey Sees More Cyberattacks Targeting APIs

Despite increased vigilance, most organizations suffered an API security incident in the last 12 months ...
Security Boulevard