API22019 Broken User Authentication

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive data. The post API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, ...
identity, verification, FireTail digital identity decentralized Entitle API identity credential theft

To Solve the API Security Crisis, Think Beyond OWASP

What’s the greatest cybersecurity threat businesses face today? If you answered ransomware, cryptojacking or phishing–which headlined lists of top cybersecurity risks in recent years–you’re stuck in the past. Although other types of ...
Security Boulevard
Erez Yalon: A Security Leader in the API Economy

Erez Yalon: A Security Leader in the API Economy

The proliferation of software applications is accelerating due to the use of APIs, which have become the technological vascular system (so to speak) of nearly every application and online service. From mobile ...
Checkmarx Research: SoundCloud API Security Advisory

Checkmarx Research: SoundCloud API Security Advisory

Recently, the Checkmarx Security Research team investigated the online music platform SoundCloud. According to their website, “As the world’s largest music and audio platform, SoundCloud lets people discover and enjoy the greatest ...
Breaking Down the OWASP API Security Top 10 (Part 2)

Breaking Down the OWASP API Security Top 10 (Part 2)

Due to the widespread usage of APIs, and the fact that attackers realize APIs are a new attack frontier, the OWASP API Security Top 10 Project was launched. From the beginning, the ...
Breaking Down the OWASP API Security Top 10 (Part 1)

Breaking Down the OWASP API Security Top 10 (Part 1)

As a result of a broadening threat landscape and the ever-increasing usage of APIs, the OWASP API Security Top 10 Project was launched. From the start, the project was designed to help ...