API Authorization

Dell Hell Redux — More Personal Info Stolen by ‘Menelik’
Richi Jennings | | Alternative Data & Scraping, api, API Abuse, API Attack, API Attack Detection, API Attack Protection, API attacks, API Authentication, API Authorization, API breaches, API Data Exposure, content scraping, data scraping, Dell, Dell Technologies, Menelik, Oracle, Oracle cloud, Oracle Cloud infrastructure, SB Blogwatch, scraper, scraper bots, Scrapers, Scraping, web scraping, web scraping attacks, webscraping, website scraping
Phish Ahoy! Hacker took advantage of Dell’s lack of anti-scraping defense ...
Security Boulevard

Facebook/Insta FAIL — ‘Anonymous Sudan’ has a Super Tuesday: ‘We Did It.’
Richi Jennings | | Anonymous, Anonymous Hacking Collective, Anonymous Sudan, API Authentication, API Authentication Errors, API Authorization, Application DDoS, application-layer DDoS attacks, Cloud DDoS, cloud outage, ddos, DDoS attack, DDoS attacks, Downtime and outages, facebook, Facebook accounts, facebook breach, facebook instagram hack, facebook login, Facebook outage, Instagram, Instagram outage, instagram vulnerability, Internet outage, internet outages, InternetOutage, Meta, Meta Networks, outage, Outage Investigation, outages, SB Blogwatch, Storm-1359, Stupidity of Instagram, Threads
Shooper Choosday: Was yesterday’s Meta outage outrage caused by a Russian DDoS? ...
Security Boulevard

Digital License Plates: Stupid, Pointless, Insecure
Richi Jennings | | API Attack, API Authentication, API Authorization, API security, Automotive Cyber Security, Automotive Security, California, digital license plate, digitalization, DMV, GPS, iot, Privacy, Reviver, Rplate, SB Blogwatch
Reviver’s Rplate digital license plates are insecure: Their design appears to be riddled with privacy holes (not to mention the daft nature of the product itself) ...
Security Boulevard

Securing partner API integrations with OAuth mTLS
Renjith Babu | | API Authorization, API best practices, API risk mitigation, API security, application architecture, B2B API protection, General, jwt, OAuth mtls, Partner authorization, RFC8705, Zero Trust Architecture
Securing partner API integrations with OAuth mTLS API access using token-based architectures is already popular, and the authorization and governance of the minted tokens for access becomes very critical for APIs, which ...

API Security Best Practices: Avoiding the Top 5 Authentication Errors
API authentication errors are listed as the top two threats outlined in the OWASP API Security Top 10, both of which can be traced back to many of the recent publicly disclosed ...