Wallarm Extends API Security Reach to AI Agents

Wallarm Extends API Security Reach to AI Agents

Wallarm at the 2025 RSA Conference announced that, starting this summer, it will extend the reach of its platform for securing application programming interfaces (APIs) to include artificial intelligence (AI) agents. Tim ...
Security Boulevard
Image 1

How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales

In the fast-paced world of online retail, where customer satisfaction and availability are paramount, a sudden attack by scalping bots can disrupt operations, inflate costs, and damage reputation. A North American Online ...
Risk-Based Authentication vs. MFA: Key Differences Explained

Risk-Based Authentication vs. MFA: Key Differences Explained

With cyber threats on the rise, organizations need stronger authentication methods. Multi-Factor Authentication (MFA) adds extra security layers, while Risk-Based Authentication (RBA) adapts based on user behavior and risk levels. In this ...

Insights from the DeepSeek Malicious Software Package Incident: Why Software Supply Chain Security Matters in Global AI Technology Competition

Background With the widespread application of AI technology, software supply chains are facing more complex and diverse security threats. Since January 2025, DeepSeek, as an emerging force in China’s AI industry, has ...
DocUSign, APIs, phishing, attacks, spam, business email, CrowdStrike Microsoft

Hackers Exploit DocuSign APIs for Phishing Campaign

Cybercriminals are exploiting DocuSign’s APIs to send highly authentic-looking fake invoices, while DocuSign’s forums have reported a rise in such fraudulent campaigns in recent months. Unlike typical phishing scams that rely on ...
Security Boulevard
The Three Pillars of Shift-Left API Security

The Three Pillars of Shift-Left API Security

| | api, DevSec, shift left
When it comes to proactive API security, there are three critical pillars: API Discovery, API Security Testing, and API Oversight ...
Security Boulevard
API Vulnerabilities Jump 21% in Third Quarter

API Vulnerabilities Jump 21% in Third Quarter

Application programming interface (API) vulnerabilities surged 21% in the third quarter, with cloud-native infrastructure increasingly targeted by cybercriminals, according to Wallarm’s Q3 2024 API ThreatStats report ...
Security Boulevard
partnerships, security, collaboration, cybersecurity,

Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem

| | AI, api, Cybersecurity, Ransomware, security
Cybersecurity has never been something to set once and leave running in the background — it is a constantly evolving landscape. While the migration of data and applications to the cloud provides ...
Security Boulevard
Comprehensive Guide to API Error Code Management

Comprehensive Guide to API Error Code Management

Mastering API error codes is essential for building robust and user-friendly applications. This comprehensive guide explores best practices for handling and documenting errors, ensuring clear communication between your API and its users ...
pen testing, Salt Security, API, APIs, attacks, testing, PTaaS, API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

APIs, Web Applications Under Siege as Attack Surface Expands

Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year growth in web attacks, driven by the increased adoption of these technologies, which significantly expanded organizational attack surfaces, according ...
Security Boulevard