Broken function-level authorization is a similar issue.

Broken function-level authorization is when applications fail to limit sensitive functions to the authorized users. Unlike broken object-level authorization, this flaw refers specifically to when unau ...

Continue Reading
If you are using a function-level authorization flaw, attackers can use the same HTTP methods to perform sensitive actions on your API that they would normally be restricted from doing.

How do we prevent this? Here’s how broken function level authorization is prevented: First, identify all of the functions in your application and classify them into three categories: admin (e.g., ad ...

Continue Reading
I’m a Senior Security Consultant at Imperva, and I’ve been doing web application security for over 15 years.

Here's my top 10 list of things that you can do to protect your website from attack: 1. Use HTTPS Everywhere (https://www.eff.org/https-everywhere) 2. Protect Your Cookies (https://blog.imperva.com/20 ...

Continue Reading
Protect API keys as you would any other sensitive credential.

3. Monitor and Log All API Activity Monitoring is critical to ensuring that APIs are operating properly, but it’s also important for security purposes. Monitoring tools should be able to detect susp ...

Continue Reading
APIs are important in the financial technology sector because they provide means for financial institutions to improve their business model by using APIs for client connectivity and integration.

APIs essentially let software talk to software and allow for leverage of data functionality that make financial institutions more efficient in the digital landscape https://t.co/wzEhBJVZlS ...

Continue Reading

Back to Main

Subscribe for the latest news: