Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Testing and Hacking APIs + OWASP TLV Sessions

Salt SecuritySalt
Jul 23, 2019

If you didn’t make it to OWASP Global AppSec Tel Aviv last month I wanted to share that the team recently published videos from the event...

…you can check out the entire lineup of 44 videos in the playlist here.

Get the latest API Security report and see how you compare

I’m excited that the list includes my session on Testing & Hacking APIs which you can see here:

While I was pulling together the slides for my session I came to realize that while there are a ton of resources for application security testing the same can’t be said about API penetration testing. This gave me the idea to put together an API Penetration Testing Tips & Tricks sheet that people can use as a reference as they pull together their own methodology and strategy for API security testing.   I’ll be continuously updating and making improvements to this sheet so let me know if you have ideas of things to add or just general feedback to make it better.

If you’re interested in seeing the Salt Security API Protection Platform in action, contact us for a customized demo today!

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

July 26, 2024

Hadar Freehling
Principal Solution Engineer

Salt Labs

Another API Security Breach: Life360

The latest API breach occurred on the Life360 platform where an advisory was able to gleam 400k user phone numbers.

Read more

July 24, 2024

Eric Schwake
Head of Product Marketing

Industry

How Salt Catches Low and Slow Attacks While Others Can’t

Most API security solutions are designed to stop simulated attacks in a lab environment. They fail miserably in real world, low and slow attacks which are how attacks happen in practice

Read more

July 23, 2024

Eric Schwake
Head of Product Marketing

Industry

Detecting API Threats In Real Time

Recognizing the value of the sensitive data APIs carry, attackers have adapted their tactics, necessitating a fundamental shift in the approach to API security.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back