API Threat Protection

OWASP API Security Top 10 – Lack of Resources & Rate Limiting

OWASP API Security Top 10 – Lack of Resources & Rate Limiting Welcome back to the OWASP API Security Top 10 series, this week we go through number 4 in the OWASP API top 10 list: Lack of Resources & Rate Limiting. For other blogs in this series, please refer to the below link: https://www.cloudvector.com/apis-underpinning-modern-technologies-to-popular-data-breaches/ …

OWASP API Security Top 10 – Lack of Resources & Rate Limiting Read More »

Does Securing APIs through Machine Learning Make Sense?

Does Securing APIs through Machine Learning Make Sense? API Security and Machine Learning The increasing number of API breaches paints a grim picture of how security of the developed APIs is evolving. Two recent incidents provide evidence. First, Uber was reportedly breached in 2019 where the attacker could simply use the victim’s phone number or …

Does Securing APIs through Machine Learning Make Sense? Read More »

OWASP API Security Top 10 – Excessive Data Exposure

OWASP API Security Top 10 – Excessive Data Exposure This week we look at the third item in the list of OWASP API security top 10 Excessive Data Exposure. Descriptions of other OWASP API top 10 can be accessed from the introductory blog available here. APIs retrieve necessary data from back end systems when client …

OWASP API Security Top 10 – Excessive Data Exposure Read More »

APIs – Underpinning Modern Technologies to Popular Data Breaches

APIs – Underpinning Modern Technologies to Popular Data Breaches In today’s world software is an essential piece driving digital transformation and also business value for every enterprise. Microsoft CEO Satya Nadella not long ago said, “every company is a software company, every company is a digital organization”. At the crux of this transformation is the …

APIs – Underpinning Modern Technologies to Popular Data Breaches Read More »

OWASP API Security Top 10 – Broken Object Level Authorization

OWASP API Security Top 10 – Broken Object Level Authorization Broken Object Level Authorization (BOLA) is the top most in the list of OWASP Top 10 API Security threats because of its ease of exploitation combined with its potential for impact as well as the difficulty to defend this threat in an organized way.    …

OWASP API Security Top 10 – Broken Object Level Authorization Read More »