api
Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks
As a mechanism to offload PCI risks, many retailers are now using third-party credit card processing for their online transactions. The retailer’s benefit is they are no longer handling the credit card ...
Refactoring a Live SaaS Environment
We decided to refactor and re-implement almost all of our back-end and UI. This is how we went through the design and implementation. You can experience the new design by trying ShiftLeft ...
API Discovery and Profiling — Visibility to Protection
APIs have become a dominant mechanism in the modern web, allowing organizations to create powerful web and mobile experiences, while exposing back-end data and logic to create new and innovative offerings. Protecting ...
Tales from the Front Lines: Whitelist and Forget, A Cautionary Tale
Stopping attackers and their malicious intent is every security practitioners’ goal. But there are times when we need to grant unfettered access to network resources for day-to-day operations. Better known as whitelisting, ...
APIs: Securing the Stitching Connecting Applications
Application programming interfaces (APIs) are an essential enabler of innovation in today’s digitally driven world. Applications (or application components) can leverage APIs to connect to other apps and communicate autonomously. APIs are ...
Web Application and API Protection — From SQL Injection to Magecart
SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security ...
Aite Group Research Validates API Security Gaps
2020 is moving into the final quarter and it appears to be the year of the API security incident with MGM, Starbucks, Data Viper and Docker as just a few examples of ...
How Isolation Changes Incident Response
Large Groups of Isolated Users Shrink Your Exposure Surface Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire ...
NDR for AWS Well-Architected
By Roger Cheeks, US-East Sales Engineer, Corelight Corelight is a powerful network traffic analysis tool that enables network detection and response (NDR) for AWS Cloud workloads by receiving packets from an AWS ...
API Security Need-to-Know: Ramifications of Weak API Authentication
In today’s blog, we will discuss the ramifications of unauthenticated APIs using the recently published ZIPNet vulnerability. ZIPNet is an online application operated by Law Enforcement Authorities in India to share Crime ...

