YiliaforAPI7api7.hashnode.dev·Apr 12, 2024Regular API Testing: Ensuring API Gateway Stability and EfficiencyIntroduction In today's digital age, Application Programming Interfaces (APIs) undoubtedly play a crucial role. It is these interfaces that make our digital lives more convenient and efficient. However, like any complex system, APIs also require regu...Discuss·34 likesAPI TESTING
Mike Elissenblog.securitylevelup.eu·Mar 26, 2024Five steps to improve your API security postureAPIs are foundational for many of the new capabilities that companies are building — but, in most cases, the security of APIs is either not considered early enough in the planning process or not able to keep up with the rapid deployment of new techno...Discuss·1 like·50 readsAPIs
Narola Infotechnarolainfotechsa.hashnode.dev·Mar 18, 2024API Security Risks and Best Practices to Mitigate ThemAPIs require robust security measures. Weaknesses in API security can expose sensitive data to theft, disrupt critical services, and tarnish a company's reputation. In 2022, US companies collectively suffered losses ranging from $12 billion to $23 bi...Discussapi security risks
Mike Elissenblog.securitylevelup.eu·Mar 13, 2024Testing APIs, from a security angle...API microservices have become a mainstay in the world of internet architecture. Roughly 31% of all the requests seen by Akamai are related to APIs which in turn has led to a tremendous increase in API attacks. In 2023 alone, Akamai saw a 2.5x growth ...Discuss·1 like·140 readsAPIs
Mohammad Abu Yousuf Sajalcodexaxor.hashnode.dev·Mar 9, 2024Obtaining Access Token with OAUTH 2.0 PKCE in PostmanAs the landscape of secure authentication evolves, understanding and implementing Authorization Code Flow with Proof Key for Code Exchange (PKCE) becomes crucial for developers. In this post, we'll delve into the practical aspects of using Postman to...Discuss·26 readssoftware development
Treblletrebllemakers.hashnode.dev·Mar 8, 2024How (Not) to Return Data from Your ApiThe point of an API is to transport data between one system and another, and the more data you make available through an API, the more a consumer can do with it. Therefore, it makes logical sense to return absolutely everything from your API. You don...Discussapi security
Treblletrebllemakers.hashnode.dev·Mar 5, 2024Takeaways From 5 Terrible API BreachesThe world now relies on APIs to function. However, these interfaces that power our daily lives are often left insecure, routinely suffering from a lack of proper authorization controls, misconfigurations, or leaky secrets. This condition has led to s...Discussapi breach
Darshilciphersec.hashnode.dev·Feb 29, 20247 Essential Steps to Mastering API Security with OWASP Top 10 Examples 🛡️Introduction In today's interconnected digital landscape, Application Programming Interfaces (APIs) play a crucial role in facilitating seamless communication between different software systems. However, with this increased connectivity comes the imp...Discuss#OWASPTop10
Romman Sabbirrommansabbir.com·Feb 19, 2024Kotlin, Spring Boot- JWT Token[Cover Image by : Ricardo Loaiza] Introduction: JSON Web Tokens (JWT) have become a popular method for secure communication between parties. In this article, we will explore the implementation of a custom JWT token utility in a Spring Boot applicatio...Discuss·171 readsKotlinKotlin
Akash Gssgssakash.hashnode.dev·Feb 11, 2024Takeaways from Cloudflare's 2024 API Security ReportCloudflare launches its annual 2024 report about how secure the APIs on the internet have been and highlights guidelines and pointers to help companies mitigate attacks on their APIs that can lead to security/data breaches. According to the company o...Discusscloudflare