Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

API Abuse - Lessons from the Duolingo Data Scraping Attack

It’s been reported that 2.6 million user records sourced from the Duolingo app are for sale. The attacker apparently obtained them from an open API provided by the company. There’s a more technical explanation available here. While we talk a lot about the vulnerabilities in the OWASP API Top-10 and the exploits associated with those vulnerabilities, this incident provides a good reminder that not all vulnerabilities are flaws in code. In fact, this API was working as designed.

Understanding API Attacks: Why they are different and how to stop them

API attacks aren’t like traditional application attacks. Understanding those differences is crucial to protecting the valuable data and services your APIs enable. Nick Rago, Salt Security Field CTO, discusses in this webinar: We hope you enjoy the webinar on the changing nature of API attacks and learn the best practices to keep your organization safe.

In the Alleys of Black Hat and DEF CON 2023: The Quiet API Security Crisis

The neon lights of Black Hat and DEF CON, with their flashing demos and groundbreaking presentations, often dazzle attendees and cyber enthusiasts alike. From AI-driven hacking tools to quantum encryption, the subjects covered span a vast spectrum. However, as with any vibrant city, these include areas of risk and concern. For Black Hat 2023 events, APIs are core to these areas.

Why No Business in 2023 Can Grow without APIs

Businesses of all sizes are increasingly relying on APIs to connect with their customers, partners, and other systems. APIs, or application programming interfaces, are the building blocks of the modern web, and they allow businesses to share data and functionality in a secure and efficient way. Without APIs, businesses are limited in their ability to innovate and grow. They lack the ability to integrate with other systems, create new products and services, or reach new markets.

What does a modern code security pipeline look like? (Hint: not like a pipeline).

What does a good DevSecOps pipeline should look like from a code security perspective? We hear this question often, and even though there are multiple answers, we’ve put together a blueprint that everybody could easily start with.

Salt Wins Prestigious SC Magazine Award - "Best API Security Solution"

It never gets old! We’re excited to share that Salt has won yet another award – our 15th award this year! This time, we have been named the “Best API Security Solution” in the renowned 2023 SC Awards. The SC Awards are cybersecurity’s most prestigious and competitive honor. The premier recognition program honors outstanding innovations, organizations and leaders that are advancing the practice of information security.

Accelerating API Security with Intel & Noname Security

Rick Echevarria, General Manager for Intel Security Center of Excellence and David Thomason, Worldwide Director of Alliances at Noname Security, sit down to discuss the expanding API attack surface, how the two companies are working together to provide next-generation API Security, as well as share their thoughts about the joint roadmap going forward. If you'd like to learn more about the partnership between Intel and Noname Security, please visit one of the following links.

How to Secure Your Financial Services APIs

Todd Hathaway, Solutions Architect, Global FinServ Practice for World Wide Technology (WWT), and Karl Mattson, CISO for Noname Security, sit down to discuss the rapidly expanding API attack surface and what financial services organizations need to do in order to protect themselves from malicious threats. By the time the video is done, you will have firm understanding of the ramifications if APIs are left insecure, as well as a set of industry-proven best practices that will help you immediately improve your API Security Posture.