Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wallarm

How to Mitigate the Latest API Vulnerability in FortiManager

Recently, a critical API vulnerability in FortiManager (CVE-2024-47575) was disclosed. Certain threat actors exploited it in the wild to steal sensitive information containing configurations, IP addresses, and credentials used by managed devices. In advanced notification emails, Fortinet warned its users of the vulnerability and mitigation steps. The vulnerability has a critical severity rating of 9.8 out of 10.

Reducing False Positives in API Security: Advanced Techniques Using Machine Learning

False positives in API security are a serious problem, often resulting in wasted results and time, missing real threats, alert fatigue, and operational disruption. Fortunately, however, emerging technologies like machine learning (ML) can help organizations minimize false positives and streamline the protection of their APIs. Let's examine how.

How Security Edge Revolutionizes API Security

Wallarm’s Security Edge is setting a new standard in API security—far beyond the reach of traditional Content Delivery Networks (CDNs). Let’s get it straight: Security Edge is not just a new addition to the API security market; it’s a disruption. Designed to deliver fast, effective, and advanced API protection where APIs need it, Wallarm’s Security Edge targets what CDNs cannot.

Successful Strategies for API Security Deployments (Wallarm October 2nd Webinar)

With the dramatic rise in API threats, API Security is a must-have security control for large and small organizations. Securing your APIs requires a clear understanding of your infrastructure and technology stack. In this webinar, we'll explore the requirements, best practices, and pitfalls of deploying an API Security platform, including: Join Wallarm experts with vast experience deploying API security across different types of infrastructure for the informative presentation.

CISO Briefing: API Security is AI Security (API ThreatStats Q3 2024 Spotlight)

API threats against AI are on the rise. The Wallarm Research team has researched and dissected the top API threats from the 3rd quarter of 2024. This report explores the top significant threats, notable API breaches, identifies key trends, and provides actionable insights that can help you strengthen your API Security program.

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for end users has finally arrived, sending the password the way of the dodo. Although they don’t get anywhere near the same hype, advanced authentication strategies for APIs are as critical as passwordless authentication for end-users.

GraphQL Security Breach: How 30 Million Accounts Were Hacked #hacked #databreach #graphql #api

In this video, we explore a real-world example of a GraphQL exploit that exposed 30 million user accounts to attackers. Learn how vulnerabilities in GraphQL led to access token generation and account takeovers, and what this means for API security.

API Security Essentials: What You Must Know About Positive and Negative Models #apisecurity #api

In this video, we dive into the fundamentals of API security by comparing two key security models: Positive and Negative. Learn how each model works, their pros and cons, and how to choose the right one to protect your APIs effectively.