Subscribe to the Salt blog to learn about the latest developments in API Security

Salt Security API Security Blog

Clear filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API5:2023 Broken Function Level Authorization (BFLA)

Broken function level authorization (BFLA) has been identified as the fifth most critical threat to APIs in the OWASP API Security Top 10, and for good reason.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API4:2023 Unrestricted Resource Consumption

API requests consume resources such as network, CPU, memory, and storage. The amount of resources required to satisfy a request greatly depends on the input from the user and the business logic of the endpoint.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API3:2023 Broken Object Property Level Authorization

An API security solution must be able to identify and report on the large variety of sensitive data types that can be sent in API requests and responses, as well as any anomalous activity where attackers send manipulated API requests with unauthorized parameters.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API2:2023 Broken Authentication

Broken authentication is the second most critical API security threat listed in the OWASP API Security Top 10. Common examples of attacks targeting broken authentication include API enumeration and brute-forcing attacks that make high volumes of API requests with minor changes.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

Technical

API1:2023 Broken Object Level Authorization (BOLA)

Failure to enforce authorization at the object level can lead to data exfiltration as well as unauthorized viewing, modification, or destruction of data.

Read more

June 6, 2023

Stephanie Best
Director, Product Marketing

OWASP API Security Top 10 2023 Explained

In this post and subsequent additions to the series, we dig into each of the Open Web Application Security Project (OWASP) API Security Top 10 in detail.

Read more

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

Get the latest API security research and see how you compare

Get the report
Back