unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
AI-Powered APIs: Expanding Capabilities and Attack Surfaces
AI and APIs have a symbiotic relationship. APIs power AI by providing the necessary data and...
2024-11-7 17:26:9 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
attackers
threats
Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale
In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices tha...
2024-11-4 18:45:0 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
docusign
malicious
invoices
attackers
phishing
How to Mitigate the Latest API Vulnerability in FortiManager
Overview of the FortiManager API VulnerabilityRecently, a critical API vulnerability in F...
2024-10-30 21:4:43 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
fortigate
cloud
fgfm
Reducing False Positives in API Security: Advanced Techniques Using Machine Learning
False positives in API security are a serious problem, often resulting in wasted results and...
2024-10-25 20:9:47 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
positives
security
wallarm
machine
threats
How Security Edge Revolutionizes API Security
Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of tra...
2024-10-24 20:21:57 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
cdns
wallarm
threats
brings
Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security
Passwordless authentication for end users is taking the world by storm, offering organization...
2024-10-18 18:29:58 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
openapi
Choosing the Right Deployment Option for Your API Security Solution
You need an API security solution. That much is a given (although some may argue it isn’t!)....
2024-10-9 15:19:14 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
threats
choosing
network
API Gateways and API Protection: What’s the Difference?
Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating...
2024-10-1 23:4:51 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
governance
Deep Dive into the Latest API Security Vulnerabilities in Envoy
‰PNGIHDRΠΟ}έVpHYs%%IR$πsRGB®ΞιgAMA±�όaΜiIDATxμέ”•ε�οωƒ¨BO.Κ5ιIFξ�rΈ•ιΐ…ΐLΦ...
2024-9-27 00:3:55 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
Θ1
jΑ
iΐ
mΎ
6ί
Deep Dive into the Latest API Security Vulnerabilities in Envoy
Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalen...
2024-9-27 00:3:55 | 阅读: 5 |
收藏
|
Wallarm Blog - lab.wallarm.com
envoy
crash
kubernetes
destroyed
Chicago API Security Summit 2024
Thank You Chicago!Earlier this week we had the pleasure of hosting a regional API Securit...
2024-9-20 22:1:1 | 阅读: 7 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
howard
lesson
aaron
intentioned
Fundamentals of GraphQL-specific attacks
GraphQL vs REST APIsDevelopers are constantly exploring new technologies that can improve the...
2024-9-14 01:41:9 | 阅读: 6 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
username
security
developers
API Attack Surface: How to secure it and why it matters
Managing an organization’s attack surface is a complex problem involving asset discovery, vuln...
2024-9-4 04:2:21 | 阅读: 4 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
gateways
developers
Evolution of Attack Surface Management
The Early Days: Basic Asset ManagementWhile it was not called ASM, the concept of managing at...
2024-8-30 23:52:51 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
monitoring
identify
asset
What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF
On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic err...
2024-8-20 03:36:15 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
ebpf
cilium
security
cves
Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulne...
2024-8-17 01:40:19 | 阅读: 8 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
quarter
q2
threatstats
Elasticidad de la nube
Descripción general de la elasticidad de la nubeLa flexibilidad es uno de los atributos cardi...
2024-8-7 18:14:41 | 阅读: 0 |
收藏
|
Wallarm Blog - lab.wallarm.com
nube
servicios
recursos
cloud
demanda
CIRCIA – Ley de notificación de incidentes cibernéticos para infraestructuras críticas
¿Qué es CIRCIA?CIRCIA, o Cyber Incident Reporting for Critical Infrastructure Act, es una pro...
2024-8-6 21:35:16 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
circia
ley
seguridad
340 secretos JWT débiles que debes revisar en tu código
¿Qué pasa con JWT?El token web JSON, usualmente identificado por sus siglas JWT, brinda un re...
2024-8-2 20:14:57 | 阅读: 3 |
收藏
|
Wallarm Blog - lab.wallarm.com
código
secretos
débiles
análisis
Definición de la tríada de la CIA. Ejemplos de confidencialidad, integridad y disponibilidad
Definición de la tríada de la CIAEl Modelo AIC o la Triada AIC es una estrategia clave para a...
2024-8-1 20:42:46 | 阅读: 1 |
收藏
|
Wallarm Blog - lab.wallarm.com
datos
protección
cia
sistemas
Previous
-5
-4
-3
-2
-1
0
1
2
Next