Do you know what 23andMe, Jason’s Deli, North Face, and Hot Topic have in common? They’ve all been breached by successful credential stuffing attacks in the last year! An attack type that has gained prominence in recent years is credential stuffing. In this blog, we will explore what credential stuffing is, discuss current approaches to mitigate this type of attack, and their weaknesses. Additionally, we’ll share our insights on what needs to be. What is…
Introduction On January 16 2024, Atlassian issued a significant alert on a critical Server-Side Template Injection (SSTI) vulnerability in Confluence…
The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves…
In today’s complex digital landscape, the security of APIs has become paramount. As we move into 2024, it’s essential to…
I am thrilled to share that Wallarm, has been named a leader in the GigaOm Radar for API Security! We…
In the realm of cybersecurity, the metaphor of “Leaky Buckets” has become an increasingly prevalent concern, particularly in the context…
I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) – Nitin Raina, CISO at ThoughtWorks,…
In the fast-paced digital world, think of Application Programming Interfaces (APIs) as the threads that stitch together the fabric of…
If you’re involved with cybersecurity and are based in Europe, then Black Hat Europe 2023 in London, December 6 and…
Insights and Protections On November 16, 2023, a significant security concern was published by Google’s Threat Analysis Group (TAG). They…