Search results: APIs

Securing APIs through penetration testing

| | Uncategorized
APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between applications, services and systems, allowing... The post ...
Breaking APIs with Naughty Strings

Breaking APIs with Naughty Strings

Learn how to leverage the Big List of Naughty Strings (BLNS) to break APIs using nothing more than Postman. The post Breaking APIs with Naughty Strings appeared first on Dana Epp's Blog ...

VulnCheck’s Free Community KEV & CVE APIs (Code & Golang CLI Utility)

VulnCheck has some new, free API endpoints for the cybersecurity community. Two extremely useful ones are for their extended version of CISA’s KEV, and an in-situ replacement for NVD’s sad excuse for ...

Understanding the OWASP API Security Top 10: Why BOLA is the Number One Risk for APIs

Understanding and addressing vulnerabilities is critical in cybersecurity, where APIs serve as the backbone for seamless data exchange. The OWASP API Security Top 10, revised in 2023, provides a comprehensive guide to ...
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens

Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens

| | API security
Government bodies are clamping down heavily on institutions and organizations that handle sensitive customer data. For APIs, tokens are used to authenticate users. We live in an era dominated by cloud-native and ...
How to secure gRPC APIs

How to secure gRPC APIs

Explore gRPC API security, what makes gRPC better than REST, and how to identify and fix gRPC vulnerabilities before they reach production ...

Commando Cat Attacks: Protect Exposed Docker APIs Today

Exposed Docker API risks pose significant security threats to organizations utilizing container technology. In recent months, a sophisticated crypto jacking operation dubbed Commando Cat has emerged as a potent threat to Docker ...
FastAPI with SQLAlchemy Tutorial

How to secure APIs built with FastAPI: A complete guide

Want to know how to secure your APIs built with FastAPI? Dive into our latest blog post, where we guide you through the best practices for FastAPI security ...
How to secure APIs built with Express.js

How to secure APIs built with Express.js

Learn how to secure your Express.js APIs effectively with our expert hands-on tutorial. Enhance security for your projects in just a few steps! ...
How to build secure APIs with Ruby on Rails: Security guide

How to build secure APIs with Ruby on Rails: Security guide

Learn to secure your Ruby on Rails applications effectively with our hands-on tutorial. Enhance security for your projects in just a few steps! ...