Tag: APIs
-
New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications
Cybersecurity researchers at ESET recently identified that new OilRig downloaders are abusing Microsoft Cloud APIs for C&C communications. …
-
Exploring Security Considerations for Fax APIs
In this post, I will be exploring security considerations for Fax APIs. As the digital transformation era continues to shape various …
-
Securing APIs for dummies
Application programming interfaces (APIs) have become the default connectivity and data exchange method of modern application environments. …
-
Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs
Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs Hunters researchers noted the vulnerability could …
-
Use IAM Identity Center APIs to audit and manage application assignments
You can now use AWS IAM Identity Center application assignment APIs to programmatically manage and audit user and group access to AWS …
-
Keep Your Organization’s APIs Protected This Holiday Season
Understanding API security risks isn’t just a good idea — it’s a business imperative. A single API breach can lead to financial losses …
-
The importance of securing APIs
APIs often handle sensitive information such as user credentials, personally identifiable information (PII), and financial details. Without …
-
The growth of APIs attracts Cybercrime: How to prepare against cyber attacks
This article will explore the evolving landscape of API-based cyber threats and outline practical strategies to bolster your defenses. …
-
Gartner predicted APIs would be the #1 attack vector – Two years later, is it true?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or …
-
APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries
Introduction In today’s interconnected digital ecosystem, Application Programming Interfaces (APIs) play a pivotal role in enabling …
-
The Silent Threat of APIs: What the New Data Reveals About Unknown Risk
The rapidly evolving digital landscape has given organizations a wealth of capabilities, largely due to the proliferation of cloud …
-
Secure Go APIs with Decentralized Identity Tokens, Part 3
When used together in decentralized identity tokens, token expiry and claims can help establish a robust security posture for Go APIs, …
●●●