Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Internet Blogs  >  Api Security internet Blog  > 

Api Security Blog


apimike.com
A blog about Api, including API Security, attack types, Rest API and much more.
2023-02-20 12:09
According to a report by the Identity Theft Resource Center (ITRC), there were 599 reported data breaches in the healthcare industry in 2020, affecting over 28 million individuals. This repr… Read More
2023-01-20 19:51
T-Mobile, one of the largest telecommunications companies in the United States, recently suffered a massive data breach that exposed the personal information of 37 million customers. As a co… Read More
2023-01-10 15:34
The recent data breach at Air France and KLM’s frequent flyer program, Flying Blue, is one in a recent spate of data breaches across frequent flyer clubs. There is an increasing concer… Read More
2023-01-09 22:20
Music streaming service Deezer has admitted to a large-scale data breach that may have affected 257,829,454 records of users worldwide. The company stated that the breach occurred in 2019 vi… Read More
2023-01-06 10:27
It’s not every day that I get to report a breach at my favorite burger joint in the world, but when duty calls, make sure your burger joint’s data is secure — no one wants… Read More
2022-12-12 11:04
The rise of cyberattacks in Australia is becoming increasingly concerning with the rise of API (Application Programming Interface) breaches. APIs provide digital access between applicat… Read More
2022-10-20 08:42
What APIs are? Before we sail in the vast seas of APIs and how they benefit businesses, let’s first recap what APIs are. An API is an interface that allows you to access the data… Read More
2022-10-10 21:08
This is the first time OWASP is calling for data. Unlike in 2019 when the API Security Top 10 was first published, as stated on their site, “we believe the API industry is now more mat… Read More
2022-10-08 06:38
Cyber Security Awareness Month is an annual campaign to raise awareness about the importance of cybersecurity. The campaign is led by the National Cyber Security Alliance and the U.S. Depart… Read More
2022-09-08 12:58
ATO, or account takeover, is a type of fraud that occurs when a third party gains access to and illegally uses a victim’s online account. This can happen if a malicious actor is able t… Read More
2022-08-31 13:44
API security is a process of securing data and services that are accessible through application programming interfaces (APIs). API security is a relatively new field, as APIs only became wid… Read More
2022-08-23 15:53
API validation is the process of checking to see if an API meets certain requirements for how it works, how well it performs, how safe it is, and other things. It is an important part of… Read More
2022-06-26 10:37
How can a Social Fitness Application spy on Mossad? Using the fitness-tracking app Strava, malicious users have been spying on Israeli military personnel. They have been able to map their… Read More
API Security Testing
2022-05-30 07:28
API refers to how one firm communicates with another’s software inside. An API lets a third party, like Facebook, directly access portions of an outside program, like TikToks’ lo… Read More
2022-05-18 14:50
What is it and why use OAS? Open API standards are becoming increasingly common for describing and documenting APIs. One benefit of using an Open API specification is that you can make do… Read More
2022-04-29 20:26
In computer networking, a server may send a response code to indicate the status of a request sent by a client. The response code may also be called an HTTP status code, an HTTP response cod… Read More
2022-04-07 21:53
API penetration testing is the process of testing the security of an API by attempting to exploit vulnerabilities in it. You want to find any security flaws that could be used by hackers and… Read More
2022-03-16 22:16
Rogue and zombie APIs are a fact of life for every organization. A rogue API is an API that was not authorized by the organization. A zombie API is an API that was authorized but is no longe… Read More
Coinbase API Vulnerability Bug
2022-02-24 20:04
Coinbase, the cryptocurrency exchange, announced a security bug in their API that would have allowed an attacker to take over user accounts. Coinbase halted all trading and withdrawals while… Read More
2022-01-27 22:07
Remote working is not a new trend when it comes to the working patterns of modern employees and companies. And it is a mistake to think that its meteoric rise is due to the current COVID-19… Read More
8 Common API Vulnerabilities
2021-12-21 09:26
API vulnerability overview APIs are becoming an integral part of business and web application development, but this growth has been accompanied by a rise in insecure API implementations t… Read More

Share the post

Api Security

×

Subscribe to Api Security

Get updates delivered right to your inbox!

Thank you for your subscription

×