Tag: apis
How ThreatX Is Protecting Organizations From Attacks, and From Working Weekends
We’re wrapping up our fiscal year here at ThreatX — always a great time to reflect on...
VIEW MOREHow to Combat Multi-Vector Attacks Against APIs and Web Apps
We at ThreatX are observing an uptick in multi-vector API and web application attacks, or...
VIEW MOREA Look at a Few Real-World Multi-Vector API & Web Application Attacks
We at ThreatX are observing an uptick in multi-vector API and web application attacks, or...
VIEW MOREDid You Read Our Most Popular 2022 Blog Posts?
What were the priorities and pain points of security teams in 2022? Based on our...
VIEW MOREWhat Is a Multi-Vector API Attack?
As attackers become more sophisticated, there has been a unique API attack evolution. Attackers are...
VIEW MOREThreatX Launches Robust Library of On-Demand Training
ThreatX is pleased to announce the launch of Threat Academy, an extensive library of on-demand...
VIEW MOREThe Best Way to Combat Bot-Based API Attacks
When defending APIs against botnet attacks, the goal is to make it too inconvenient and expensive...
VIEW MOREBroken Function-Level Authorization: What It Is, How We Can Help
No. 5 on the 2023 OWASP API Top 10 vulnerabilities list is broken function-level authorization....
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MORELack of Resources and Rate Limiting: What It Is, How We Can Help
NOTE: The 2023 OWASP API Top 10 vulnerabilities list replaced Lack of Resources and Rate Limiting...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREChallenges of Stopping Bot-Based API Attacks
Bots are increasingly making life more difficult for security teams. Attacks against APIs and web...
VIEW MORE