News

Growing use of APIs give attackers more ways to break authentication controls, exfiltrate data, or perform disruptive acts.
The process of securing an API against broken user authentication attacks must be holistic and taken into consideration from the beginning. Implementing access controls for all sensitive data and ...
For instance, “If you’re using the AirBnB or the Uber app, these apps are calling their APIs so those apps are being authenticated.”In the case of Moonpig – authentication was enforced ...
At Black Hat USA 2025, Dirk-jan Mollema showed how low-privilege cloud accounts can be turned into hybrid admins, bypassing ...
API Misuse is a Major Threat Vector The problem with APIs is that they are used by many applications and people. APIs can be used in so many ways, making them a prime target for hackers. The trend of ...
In my audits of hundreds of Android mobile apps I have seen many attempts to hide the API key. In this article we look at some of the ways developers have tried to protect your API key.
A look at the recently released YubiKey 5 hardware authenticator series and how web authentication with the new WebAuthn API leverages devices like the YubiKey for painless website registration and ...
How to implement basic password authentication for a minimal API in ASP.NET Core using a custom authentication handler that validates the user’s credentials against a database.