Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Technical

What Can Attackers Do With API Vulnerabilities?

Chris WestphalChris Westphal
Aug 4, 2020

Episode number 4 of API Security With A Pinch Of Salt is here. In this episode Chris and Ran talk about what attackers are going after when they target APIs and what they can do if they find and successfully exploit a vulnerability.

Learn how app architecture and attack surfaces are changing, how app security needs to evolve, and how to empower security.

What is API logic you ask? How about BOLA? And can a denial of service really be executed without being distributed? Check out the video to hear about all of that and more.

If you’re interested in seeing the Salt Security API Protection Platform in action, contact us for a customized demo today!

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

October 31, 2024

Alexandria Nicosia
Social Media Manager

Industry

Securing APIs in Retail: Safeguarding Customer Data

In the fast-paced retail industry, where customer trust and data protection are critical, API security must be a top priority to ensure both reliability and a seamless customer experience, confidence, and trust in digital services.

Read more

October 30, 2024

Eric Schwake
Head of Product Marketing

Customer

Salt Security and Dazz: A Powerful Partnership for API Security

Integrating Salt Security and Dazz provides a robust solution for organizations aiming to enhance their API and application security.

Read more

October 29, 2024

Eric Schwake
Head of Product Marketing

Industry

Lessons from the Cisco Data Breach—The Importance of Comprehensive API Security

In the wake of Cisco’s recent data breach involving exposed API tokens - amongst other sensitive information - the cybersecurity community is reminded once again of the significant risks associated with unsecured APIs.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back