Syndicated Blog

Wallarm
Cloud-Native Application and API Security

Wallarm’s Open Source API Firewall debuts at Blackhat Asia 2024 – Introduces Key New Features & Functionalities

| | API security
Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently concluded Blackhat Asia 2024 conference in Singapore. The open-source API Firewall by Wallarm is a free, lightweight ...
pa exploit2

How to track and stop CVE-2024-3400: Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics

| | API security
On Friday April 12, Palo Alto disclosed that some versions of PAN-OS are not only vulnerable to remote code execution, but that the vulnerability has been actively exploited to install backdoors on ...
Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts

Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts

| | API security
APIs (Application Programming Interfaces) have proliferated widely, which increases their susceptibility to various vulnerabilities. In the realm of web applications, prime examples that stand out are SOAP (Simple Object Access Protocol) and ...
Spoutible Enhances Platform Security through Partnership with Wallarm

Spoutible Enhances Platform Security through Partnership with Wallarm

| | API security
Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community, has taken a significant step forward in its mission to ensure user ...
Top 4 Industries at Risk of Credential Stuffing  and Account Takeover (ATO) attacks

Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks

| | API security
All industries are at risk of credential stuffing and account takeover (ATO) attacks. However, some industries are at a greater risk because of the sensitive information or volume of customer data they ...
Top 5 Data Breaches That Cost Millions

Top 5 Data Breaches That Cost Millions

| | API security
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If ...
Test and evaluate your WAF before hackers

Test and evaluate your WAF before hackers

Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most common application security technologies available on the market. Since the last century, WAFs have evolved by ...
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens

Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens

| | API security
Government bodies are clamping down heavily on institutions and organizations that handle sensitive customer data. For APIs, tokens are used to authenticate users. We live in an era dominated by cloud-native and ...
Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

Improving Security with Wallarm’s NIST CSF 2.0 Dashboard

| | API security
Ensuring the security of web applications and APIs is more critical than ever. With threats becoming increasingly prevalent and sophisticated, organizations need to employ comprehensive security measures to protect their digital assets ...
How protobuf works

avro vs protobuf

|
A Kickoff Discussion on Core Aspects of Avro & Protobuf When deliberating on the subject of data structure encoding, a tandem of tools frequently emerges in technical discussions: Avro and Protobuf. Originating ...

Secure Guardrails