What’s hiding in the shadows? It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or an unmanaged cloud storage volume, you can’t protect what you don’t know about. Attackers thrive on this fact, and specifically seek out such assets as points of entry. This is why it’s included in the OWASP APIsec Top-10 in the Improper Assets Management…
Welcome to our April API newsletter, recapping some of the events of last month. This month’s topic is Generative AI…
We’re looking forward to seeing you at this year’s RSA Conference! Don’t forget to set up a meeting with our…
Welcome to our March API newsletter, recapping some of the events of last month. And what a month it was.…
ChatGPT is spreading like wildfire all over the internet, being used in everything from casual tools to cybersecurity and even…
ICYMI, we recently presented A CISOs Guide to the New 2023 OWASP API Security Update. In this first of two…
March has arrived and is roaring like a very confused lion, at least in the northern hemisphere. And much like…
In 2022, the Wallarm Threat Research team went through almost 350,000 reports to find 650 API-specific vulnerabilities, and tracked 115…
The Wallarm Detect team has found exploit attempts in the wild of CVE-2022-31678 and CVE-2021-39144. The original vulnerabilities were found…
We’re pleased to present the latest quarterly review and analysis of API vulnerabilities and exploits. This time, we’re going to…