Application programming interfaces (APIs) make everything a bit easier - from data sharing to system connectivity to delivery of critical features and functionality - but they also make it much easier for the bad actors (and the bad bots they deploy). Here are the top 5 API vulnerabilities that get exploited by hackers, including some tips to help close those gaps.
Android smartphones are some of the most popular handheld devices around the world. However, if you have an Android smartphone, a new report may urge you to reconsider which apps you have installed on your phone. Researchers from Pradeo have warned about six dangerous apps that can swindle you out of thousands. The apps are loaded with a dangerous malware dubbed Joker, according to Pradeo.
vpnMentor’s research team, led by analysts Noam Rotem and Ran Locar, recently discovered a sensitive data breach originating from the domestic violence prevention app Aspire News App.
The new NIST standards for IAST and RASP are a testament that outside-in AppSec approaches are antiquated, inefficient, and ineffective. Security instrumentation is more than a paradigm shift of the future—it is an opportunity for today.
The Technical College System of Georgia (TCSG) announced a program designed to prepare more Georgians with the technology skills necessary for careers utilizing cloud technologies.
Nearly half of all companies surveyed in a report have delayed moving an application into production because of concerns over security of containers or Kubernetes.
Main Street Clinical Associates, PA ("Main Street") in Durham, North Carolina has provided notice of a data breach that potentially impacts regulators and individuals.
FBI and federal agencies held a discussion for leaders of Texas pipeline and oil and gas enterprises on physical and cyber threats to the U.S. energy infrastructure.