Broken user authentication can lead to stolen or leaked access tokens, which are then used by attackers to impersonate users.

API #3: Excessive Data Exposure The third vulnerability is excessive data exposure. This happens when an API exposes too much information about the underlying system and its resources. For instance, ...

Continue Reading
WS Security is not enough to secure your SOAP web services.

WS Security Threats and Countermeasures The WS-Security standard does not provide a complete security solution, but it can help you achieve some of the following goals: Confidentiality – ensure tha ...

Continue Reading
Use access tokens to authenticate users.

If you’re using access tokens, make sure they are generated and invalidated properly, and that the token is not leaked via another vulnerability. API #3: Excessive Data Exposure The third vulnerabi ...

Continue Reading
Broken user authentication is a vulnerability that occurs when an API does not properly authenticate users.

Attackers can exploit this issue to impersonate other users and access their data or perform actions on their behalf. API #3: Excessive Data Exposure The third vulnerability in the OWASP API top ten ...

Continue Reading
I’m a big fan of the “tl;dr” meme.

It's an easy way to summarize something that is long and complicated, but still retain most of its meaning. I've found it especially useful in my work as a software engineer because many times I have ...

Continue Reading
ApiDays is a global community of developers, architects and CTOs who are passionate about APIs.

We organise events where we share knowledge, learn from each other and network with the industry’s top experts. We believe that APIs will become the new standard for application integration in the d ...

Continue Reading
This is a great book.

It’s not for everyone, but it should be required reading for anyone who wants to understand the history of modern China and how that history has shaped its present https://t.co/xwgKIm4Yuq ...

Continue Reading
The future of the Internet is decentralized, and it’s going to be awesome.

The Web was born in a time when nobody could have imagined that we would one day need to worry about privacy or net neutrality. The Web has been around for over 20 years now, and most people are aware ...

Continue Reading

Back to Main

Subscribe for the latest news: