Binshad Aptechstockinsights.hashnode.dev·Feb 12, 2025AI vs. Hackers: How Cybersecurity is Fighting Back in 2025⚒ The Rise of AI in Cybersecurity Artificial intelligence has revolutionized countless industries, and cybersecurity is no exception. AI’s ability to analyze vast amounts of data, detect anomalies, and respond to threats in real time has made it an i...68 likesThe Ultimate AI Showdown#MicrosoftCopilot
Vivekwww.curious-engineer.com·Jan 14, 2025secure your APIsWhat are APIs and why are they important? An Application Programming Interface (API) is a well-defined set of protocols and tools that enables communication between software applications. It acts as an intermediary, allowing programs to request and r...#apisecurity
Rosecurifylog.rosecurify.com·Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 📚 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...seclogseclog
Annanya Sahannanyasah.hashnode.dev·Jul 13, 2024APIs: Your Developer Superpower ToolkitAPIs are indeed superpowers for the developers. They grant developers incredible power to build applications that interact with a vast array of functionalities, from seamlessly integrating with third-party services to harnessing complex machine learn...APIs
Rosecurifylog.rosecurify.com·Jun 29, 2024Seclog - #80📚 SecMisc The CloudSec Engineer - Resources and articles for cloud security engineers. - Read More Entities allowed between function calls - Shazzer - Analysis of security implications of entities allowed between function calls. - Read More 📰 S...seclogseclog
Venkatakumar Chembatiblog.techstackengineer.com·May 10, 2024The Importance of HTTPS for API SecurityWhat is so crucial about HTTPs in today's digital landscape that most websites mandate its use? In this article, we delve into the differences between HTTP and HTTPs. To understand better about this concept, let's explore the fundamentals of TLS/SSL ...83 reads#apisecurity
Lohith Gowda Mblog.lohigowda.in·Apr 18, 2024Securing the Cloud: From S3 Credentials to RDS Database AccessI recently went on a bit of adventure with an application used for webinar and 1:1 meetings. It's a start-up based in Bangalore, and guess what? It ended with me accessing the RDS database! Let me take you through how it all happened. Discovering the...2 likes·502 readsbugbounty
Narola Infotechnarolainfotechsa.hashnode.dev·Mar 18, 2024API Security Risks and Best Practices to Mitigate ThemAPIs require robust security measures. Weaknesses in API security can expose sensitive data to theft, disrupt critical services, and tarnish a company's reputation. In 2022, US companies collectively suffered losses ranging from $12 billion to $23 bi...api security risks
Ben-Hur Santos Ottblog.guiadeappsec.com.br·Sep 3, 2023AppSec Newsletter 0006Bom dia champs! Chegamos a mais uma edição da nossa newsletter! Links [artigo] A Guide to Threat Modelling for Developers [artigo] Smashing the state machine: the true potential of web race conditions [curso - youtube] OWASP API Security Top 10 Co...34 readsappsec
muhammad zubairmuhammadzubair.hashnode.dev·Aug 23, 2023Mastering API Security: A Comprehensive Guide 🛡️Introduction to Application Programming Interfaces (APIs) has revolutionized how software applications communicate and interact. In today's digital landscape, securing APIs has become paramount to ensure data integrity, user privacy, and overall syst...#apisecurity