api

Hackers Exploit DocuSign APIs for Phishing Campaign
Cybercriminals are exploiting DocuSign’s APIs to send highly authentic-looking fake invoices, while DocuSign’s forums have reported a rise in such fraudulent campaigns in recent months. Unlike typical phishing scams that rely on ...
Security Boulevard

The Three Pillars of Shift-Left API Security
When it comes to proactive API security, there are three critical pillars: API Discovery, API Security Testing, and API Oversight ...
Security Boulevard

API Vulnerabilities Jump 21% in Third Quarter
Application programming interface (API) vulnerabilities surged 21% in the third quarter, with cloud-native infrastructure increasingly targeted by cybercriminals, according to Wallarm’s Q3 2024 API ThreatStats report ...
Security Boulevard

Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Cybersecurity has never been something to set once and leave running in the background — it is a constantly evolving landscape. While the migration of data and applications to the cloud provides ...
Security Boulevard

Comprehensive Guide to API Error Code Management
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | api, Best Practices, developers, Development
Mastering API error codes is essential for building robust and user-friendly applications. This comprehensive guide explores best practices for handling and documenting errors, ensuring clear communication between your API and its users ...

APIs, Web Applications Under Siege as Attack Surface Expands
Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year growth in web attacks, driven by the increased adoption of these technologies, which significantly expanded organizational attack surfaces, according ...
Security Boulevard

Risk and Reward of APIs and Third-Party Connectors in the Cloud
Risk and Reward of APIs and Third-Party Connectors in the Cloud7 min read·Just now--A Security Operations (#SecOps) and Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer.Third-party connectors through an Application ...

Deploy API Security On-Premises with New Imperva API Security Anywhere Self-Managed Option
API Security Anywhere Self-Managed Option Imperva continues to deliver solutions that help customers protect their applications and APIs, whether in the Cloud, on-premises, or in a hybrid environment. Imperva API Security includes ...

API Access Control: Optimizing your API Security
In the digital transformation era, APIs have become the glue that holds modern tech stacks together. APIs are critical for enabling seamless communication and data exchange between systems. However; the rise of ...

Understanding API Key Verification
As organizations look to improve their API security, two distinct approaches to API key verification have emerged — centralized and decentralized verification ...
Security Boulevard