RosecurifyforSeclog - Securify Spotlightlog.rosecurify.com·Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 📚 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...Discussseclogseclog
Annanya Sahforannanyasah.hashnode.dev·Jul 13, 2024APIs: Your Developer Superpower ToolkitAPIs are indeed superpowers for the developers. They grant developers incredible power to build applications that interact with a vast array of functionalities, from seamlessly integrating with third-party services to harnessing complex machine learn...DiscussAPIs
RosecurifyforSeclog - Securify Spotlightlog.rosecurify.com·Jun 29, 2024Seclog - #80📚 SecMisc The CloudSec Engineer - Resources and articles for cloud security engineers. - Read More Entities allowed between function calls - Shazzer - Analysis of security implications of entities allowed between function calls. - Read More 📰 S...Discussseclogseclog
Venkatakumar ChembatiforVenkatakumar Chembati's blogblog.techstackengineer.com·May 10, 2024The Importance of HTTPS for API SecurityWhat is so crucial about HTTPs in today's digital landscape that most websites mandate its use? In this article, we delve into the differences between HTTP and HTTPs. To understand better about this concept, let's explore the fundamentals of TLS/SSL ...Discuss·72 reads#apisecurity
Lohith Gowda MforLohith Gowda's Blogblog.lohigowda.in·Apr 18, 2024Securing the Cloud: From S3 Credentials to RDS Database AccessI recently went on a bit of adventure with an application used for webinar and 1:1 meetings. It's a start-up based in Bangalore, and guess what? It ended with me accessing the RDS database! Let me take you through how it all happened. Discovering the...Discuss·2 likes·489 readsbugbounty
Narola InfotechforNarola Infotech - Staff Augmentationnarolainfotechsa.hashnode.dev·Mar 18, 2024API Security Risks and Best Practices to Mitigate ThemAPIs require robust security measures. Weaknesses in API security can expose sensitive data to theft, disrupt critical services, and tarnish a company's reputation. In 2022, US companies collectively suffered losses ranging from $12 billion to $23 bi...Discussapi security risks
Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·Sep 3, 2023AppSec Newsletter 0006Bom dia champs! Chegamos a mais uma edição da nossa newsletter! Links [artigo] A Guide to Threat Modelling for Developers [artigo] Smashing the state machine: the true potential of web race conditions [curso - youtube] OWASP API Security Top 10 Co...Discuss·33 readsappsec
muhammad zubairforEmx xubimuhammadzubair.hashnode.dev·Aug 23, 2023Mastering API Security: A Comprehensive Guide 🛡️Introduction to Application Programming Interfaces (APIs) has revolutionized how software applications communicate and interact. In today's digital landscape, securing APIs has become paramount to ensure data integrity, user privacy, and overall syst...Discuss#apisecurity
Christopher ChilengweforChristopher Chilengwechristopherchilengwe.hashnode.dev·Jul 21, 2023Application Programming Interface (API)API stands for "Application Programming Interface." It is a set of rules and protocols that allows different software applications to communicate and interact with each other. APIs enable developers to access certain functionalities or data from a we...DiscussAPIs
Mike ElissenforSecurity Level Upblog.securitylevelup.eu·Jun 5, 2023OWASP Top 10 API Security Risks | 2023 Edition is finally here!Today is the official release of the OWASP Top 10 API Security Risks | 2023 Edition and I am excited to see OWASP continue to create awareness around API security and the risks they are facing. I am proud to contribute to the new list with my insight...Discuss·11 likes·234 reads#apisecurity