Spoutible Enhances Platform Security through Partnership with Wallarm

Spoutible Enhances Platform Security through Partnership with Wallarm

| | API security
Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community, has taken a significant step forward in its mission to ensure user safety, security and data integrity. Recognizing the critical importance of robust API security in today’s digital age, Spoutible ... Read More
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens

Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens

| | API security
Government bodies are clamping down heavily on institutions and organizations that handle sensitive customer data. For APIs, tokens are used to authenticate users. We live in an era dominated by cloud-native and cloud-first solutions that rely on these services to provide dynamic data storage capabilities and overall computing  capabilities  for ... Read More
Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

| | API security
Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated, organizations need to employ comprehensive security measures to protect their digital assets. The NIST Cybersecurity Framework (CSF) 2.0 stands at the forefront of these efforts, offering a structured approach to ... Read More
Blocking Compromised Tokens with Wallarm

Blocking Compromised Tokens with Wallarm

| | API security
In our Annual API ThreatStats report, we highlighted the increasing threat of API Leaks. An API Leak is the disclosure of sensitive API information, such as a token, credential, or private schema. These leaks can occur directly via the API itself, but also via third party tools used to manage ... Read More
Wallarm’s Crusade Against Rising  Credential Stuffing Threats

Wallarm’s Crusade Against Rising Credential Stuffing Threats

| | API security
Credential Stuffing, a vital yet often overlooked aspect of cybersecurity, needs to be addressed with urgency. An alarmingly large segment of the population engages in the risky habit of using the same password for various accounts. This behavior parallels the risk of using a universal key for various locks in ... Read More
Server-Side Template Injection Vulnerability in Confluence Data Center and Server (CVE-2023-22527)

Server-Side Template Injection Vulnerability in Confluence Data Center and Server (CVE-2023-22527)

| | API security
Introduction On January 16 2024, Atlassian issued a ​​significant alert on a critical Server-Side Template Injection (SSTI) vulnerability in Confluence Data Center and Server, identified as CVE-2023-22527. This issue found in older versions, poses a serious risk as it allows attackers without any authentication, to inject OGNL expressions. This means ... Read More

Addressing the Rising Threat of API Leaks

| | API security
In the realm of cybersecurity, the metaphor of "Leaky Buckets" has become an increasingly prevalent concern, particularly in the context of API security. This term encapsulates the hidden vulnerabilities and exposures in API infrastructures that many organizations struggle to identify and address. The digital era has amplified these challenges, with ... Read More
Bolstering API Security: Introducing Wallarm’s  API Attack Surface Management (AASM)

Bolstering API Security: Introducing Wallarm’s API Attack Surface Management (AASM)

| | API security
In the fast-paced digital world, think of Application Programming Interfaces (APIs) as the threads that stitch together the fabric of our tech ecosystems. They're often overlooked, quietly ensuring that your apps communicate seamlessly and keep the digital world running smoothly. The majority of organizations grapple with a common challenge — ... Read More
Navigating Threats – Insights from the Wallarm API ThreatStats™ Report Q3’2023

Navigating Threats – Insights from the Wallarm API ThreatStats™ Report Q3’2023

The world of digital technology is perpetually evolving, positioning cybersecurity as a frontline defense in safeguarding essential digital assets. A primary challenge in this sector, accentuated by the Wallarm API ThreatStats™ report Q3’2023, is ensuring robust API security. This in-depth report emphasizes the urgent need for immediate, strategic actions from ... Read More
Elevating Enterprise API Security with Wallarm for MuleSoft Anypoint Platform

Elevating Enterprise API Security with Wallarm for MuleSoft Anypoint Platform

| | API security
In an age characterized by digital transformation, APIs serve as the backbone of modern applications, enabling diverse systems to communicate and share data seamlessly. This widespread API adoption, however, exposes organizations to a considerable attack surface, inviting the attention of cyber adversaries searching for vulnerabilities to exploit. A recent 2023 ... Read More