Subscribe to the Salt blog to learn about the latest developments in API Security

Salt Security API Security Blog

Clear filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

June 14, 2023

Salt Labs
Research Team

Salt Labs

CVE-2023-34362 - Zero-Day Vulnerability Discovered in MOVEit Transfer is Exploited in the Wild by Cl0p Ransomeware — Here’s What you Need to Know

On May 29, 2023, a critical security vulnerability, identified as CVE-2023-34362, was published. Learn the details of this vulnerability, its implications, and recommendations for users to mitigate the risk.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API10:2023 Unsafe Consumption of APIs

The unsafe consumption of APIs can lead to security breaches, exposing sensitive data, user credentials, or proprietary information, as attackers may exploit vulnerabilities in API usage to gain unauthorized access, execute arbitrary code, or perform unauthorized actions within the system.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API9:2023 Improper Inventory Management

Improper Inventory Management is the ninth security threat listed in the OWASP API Security Top 10. By exploiting this vulnerability, attackers can gain unauthorized access to sensitive data, or even gain full server access through old, unpatched or vulnerable versions of APIs.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API8:2023 Security Misconfiguration

There are certainly cases where security misconfiguration can be the result of something basic like a missing patch, but some misconfigurations are far stealthier and can be obscured by complex architectures.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API7:2023 Server Side Request Forgery

A Server Side Request Forgery (SSRF) API attack occurs when an attacker manipulates an API endpoint to make the targeted server perform unintended requests on behalf of the attacker.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API6:2023 Unrestricted Access to Sensitive Business Flows

This threat has replaced Mass Assignment as number 6 on the OWASP API Security Top 10 list. It occurs when an API exposes a business flow without compensating for how the functionality could cause harm if used excessively through automation.

Read more

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

Get the latest API security research and see how you compare

Get the report
Back