RSA is all about building bridges and connections.
Meet up with the FireTail team at stand D20 in the exhibitor area at Uk Cyber Week!
API microservices architecture is a game-changing approach that can help businesses improve their systems and processes.
In this episode of the Ask a CISO podcast, we talk about application security with guest Tanya Janca.
Join FireTail virtually at API Secure 2023! Jeremy Snyder will share learnings from a decade of API data breaches, and discuss why FireTail takes a unique approach to API security
FireTail's Paul MG will speak about the OWASP API Top 10 at Scale 20x.
As attackers become more knowledgeable about different APIs, they can exploit these weaknesses to gain access to sensitive information or execute malicious code on vulnerable systems.
API Security Management is a critical aspect of application security and data security.
Over the last few years, web application attacks have become one of the leading causes of data breaches, making web application security increasingly important for overall security posture.
Following on to previously reported connected car API problems, the worst disclosure to date has been published.
SiriusXM, like Hyundai, designed and deployed weak APIs into the wild.
According to FireTail’s First Law of API Security: If an API can be hacked and compromised, it will be. And indeed, security researchers found a vulnerability in myHyundai’s API that allowed a potential attacker to access functions that the app would allow, including starting the car, turning the lights on and off, locking the car and more.
Let’s talk about the pervasiveness of APIs by discussing a real-life scenario most of us can relate to: hailing a trip on a rideshare app.So first, you open up the app using your phone and request a ride to your location. That sends a request from your phone[...]
This is a worst-case scenario for a breach of API security. Leaving an API endpoint online that does not require authentication is just asking for trouble, no matter how innocuous it may seem, as this provides an easy opening for hackers.
DevOps Institute SkilUp Presentation: Embedding API Security by Design into DevOps Pipelines
Researchers have proven that data stored in a browser's cache can be accessed.
Apps with leftover API credentials can be exploited by bad actors to create a bot army.
While the COVID pandemic is far from over, the era of the COVID exposure app may be. With Canada sunsetting its COVID alert app, it’s a good time to reflect on how in this case the API gave birth to the app instead of vice versa.
Here at FireTail, we believe that API security is crucial moving forward. We are focused on what we believe will be the next attack vector – the API.