OWASP Top 10 API

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods
API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive data. The post API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, ...

To Solve the API Security Crisis, Think Beyond OWASP
What’s the greatest cybersecurity threat businesses face today? If you answered ransomware, cryptojacking or phishing–which headlined lists of top cybersecurity risks in recent years–you’re stuck in the past. Although other types of ...

Erez Yalon: A Security Leader in the API Economy
The proliferation of software applications is accelerating due to the use of APIs, which have become the technological vascular system (so to speak) of nearly every application and online service. From mobile ...

Checkmarx Research: SoundCloud API Security Advisory
Recently, the Checkmarx Security Research team investigated the online music platform SoundCloud. According to their website, “As the world’s largest music and audio platform, SoundCloud lets people discover and enjoy the greatest ...

Breaking Down the OWASP API Security Top 10 (Part 2)
Due to the widespread usage of APIs, and the fact that attackers realize APIs are a new attack frontier, the OWASP API Security Top 10 Project was launched. From the beginning, the ...

Breaking Down the OWASP API Security Top 10 (Part 1)
As a result of a broadening threat landscape and the ever-increasing usage of APIs, the OWASP API Security Top 10 Project was launched. From the start, the project was designed to help ...