News

Attackers are targeting APIs with great success. Here's how to begin assessing your API attack surface and minimize your risk. We live in a world of cloud computing, mobile devices and microservices.
Some of the worst API-based data breaches have been caused by a combination of exploits such as BOLA and excessive data exposure. Given what’s at stake, it’s vital that you build security into ...
The new OWASP API list highlights the biggest threats, such as authentication, business logic flaws and excessive data exposure. “This knowledge if vital in deploying the right strategies to ...
As 2025 unfolds, companies face a paradox: digital acceleration is non-negotiable, but it’s also becoming their biggest ...
The API threats include excessive data exposure, lack of resources and rate limits, security misconfiguration and susceptibility to injection attacks from a lack of input filtering. The ...
many of which correspond indirectly to items described in the OWASP API Security Top 10.” These include excessive data exposure, security misconfiguration, exposure to injection attacks due to lack of ...
API vulnerabilities are a significant concern for all types of AI products. Direct threats include excessive data exposure and weak or broken API authentication or access controls. Indirect ...
This excessive network trust will inevitably be exploited, leading to breaches and bringing legal, financial and regulatory exposure ... server is compromised (data center breach) Reports ...