mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

591
comptes actifs

#apisecurity

1 message1 participant0 message aujourd’hui
Tanya Janca | SheHacksPurple :verified: :verified:<p>I'm giving a paid workshop on the <a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> Top Ten with AntiSyphon training on September 19th, with a ranging pay scale. Check it out here: </p><p><a href="https://twp.ai/4ioFrR" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4ioFrR</span><span class="invisible"></span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>I'm giving a paid workshop on the <a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> Top Ten with AntiSyphon training on September 19th, with a ranging pay scale. Check it out here: </p><p><a href="https://twp.ai/4inqEs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4inqEs</span><span class="invisible"></span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>🎥 Missed one of my past conference talks? Let’s fix that.</p><p>I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.</p><p>“Top Ten Security Tips for APIs”<br>📽️ <a href="https://twp.ai/4ioX6N" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4ioX6N</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>I'm giving a paid workshop on the <a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> Top Ten with AntiSyphon training on September 19th, with a ranging pay scale. Check it out here: </p><p><a href="https://twp.ai/4inqlb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4inqlb</span><span class="invisible"></span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>🎥 Missed one of my past conference talks? Let’s fix that.</p><p>I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.</p><p>“Top Ten Security Tips for APIs”<br>📽️ <a href="https://twp.ai/4in9ou" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4in9ou</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a></p>
:mastodon: Mike Amundsen<p>If You’re Not Threat Modeling, Your API Is Already Vulnerable - DevX <a href="https://buff.ly/uqPiDEb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/uqPiDEb</span><span class="invisible"></span></a></p><p>"if you care about uptime, user trust, or your job, you need to know where your API’s soft spots are. Otherwise, attackers will find them for you."</p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiDesign</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🚀 New Brand Story from <a href="https://infosec.exchange/tags/RSAC2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RSAC2025</span></a>: Runtime Protection at the New Digital Front Line</p><p>At <a href="https://infosec.exchange/tags/RSAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RSAC</span></a> Conference 2025, Sean Martin, CISSP sat down with Rupesh Chokshi, Senior Vice President and GM of Application Security at Akamai Technologies, to talk about how AI-driven applications and <a href="https://infosec.exchange/tags/APIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIs</span></a> are reshaping the security landscape.</p><p>🔐 Why are runtime attacks on APIs and <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> apps growing—and why is prevention alone no longer enough?</p><p>Find out how Akamai is evolving its Web Application and API Protection (<a href="https://infosec.exchange/tags/WAAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WAAP</span></a>) strategies to meet these emerging threats head-on.</p><p>🎙️ Watch, listen, or read the full story here:<br>👉 <a href="https://www.itspmagazine.com/their-stories/the-new-front-line-runtime-protection-for-ai-and-api-driven-attacks-a-brand-story-with-rupesh-chokshi-from-akamai-an-on-location-rsac-conference-2025-brand-story" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/the-new-front-line-runtime-protection-for-ai-and-api-driven-attacks-a-brand-story-with-rupesh-chokshi-from-akamai-an-on-location-rsac-conference-2025-brand-story</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/apisecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apisecurity</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p>
:mastodon: Mike Amundsen<p>5 Ways to Secure Agentic Access to APIs | Nordic APIs | <a href="https://buff.ly/EfQmZis" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/EfQmZis</span><span class="invisible"></span></a></p><p>"This shift from human-driven API calls to autonomous and large-scale agentic interactions means that security must become more dynamic, more machine-centric, and based on workloads rather than simple identity." -- <a href="https://mastodon.social/tags/KristopherSandoval" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KristopherSandoval</span></a> </p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/genAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genAI</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🌐 The Digital Terrain Is Shifting — Are Your Apps and APIs Ready?</p><p>As AI adoption accelerates, so do AI-driven attacks.<br>In their new research report, Akamai Technologies uncovers the evolving threats facing web applications and APIs — and how organizations can respond before attackers get ahead.</p><p>State of Apps and API Security 2025: How <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> Is Shifting the Digital Terrain explores the sharp rise in automated, intelligent threats — and the new defenses emerging to meet them.</p><p>📥 Download the full report here: <a href="https://itspm.ag/akamaixmwd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/akamaixmwd</span><span class="invisible"></span></a><br>📌 Research like this helps <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> professionals, <a href="https://infosec.exchange/tags/leaders" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leaders</span></a>, and <a href="https://infosec.exchange/tags/developers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>developers</span></a> stay ahead of the curve — and shape the future of <a href="https://infosec.exchange/tags/digital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digital</span></a> defense.</p><p>🎙️ We’re also proud to feature Akamai in our RSAC 2025 coverage — with a Brand Story recorded pre-event and a follow-up conversation happening on location at the conference in San Francisco with Rupesh Chokshi, Sean Martin, CISSP, and Marco Ciappelli.</p><p>Watch the pre-event recording here: <a href="https://youtu.be/DMm6INJ_2Z8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/DMm6INJ_2Z8</span><span class="invisible"></span></a> </p><p>🙏 A huge thank you to the Akamai team for sponsoring our coverage and sharing their insights with our global audience.</p><p>👇 Check out the report and stay tuned for more from RSAC:</p><p>📥 Download the Report: <a href="https://itspm.ag/akamaixmwd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/akamaixmwd</span><span class="invisible"></span></a><br>🌐 Explore our RSAC 2025 Coverage: <a href="https://www.itspmagazine.com/events/rsac-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/events/rsac-2</span><span class="invisible">025</span></a></p><p><a href="https://infosec.exchange/tags/akamai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>akamai</span></a> <a href="https://infosec.exchange/tags/rsac2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rsac2025</span></a> <a href="https://infosec.exchange/tags/brandstory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>brandstory</span></a> <a href="https://infosec.exchange/tags/apigateway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apigateway</span></a> <a href="https://infosec.exchange/tags/applicationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>applicationsecurity</span></a> <a href="https://infosec.exchange/tags/aiinsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aiinsecurity</span></a> <a href="https://infosec.exchange/tags/webappsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webappsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityresearch</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/digitaldefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaldefense</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/itspmagazine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itspmagazine</span></a> <a href="https://infosec.exchange/tags/rsaconference" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rsaconference</span></a> <a href="https://infosec.exchange/tags/apisecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apisecurity</span></a> <a href="https://infosec.exchange/tags/aiattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aiattacks</span></a> <a href="https://infosec.exchange/tags/securityreport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityreport</span></a> <a href="https://infosec.exchange/tags/cybersecurityinnovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityinnovation</span></a> <a href="https://infosec.exchange/tags/securitystrategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitystrategy</span></a> <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a></p>
Miguel Afonso Caetano<p>"API keys are foundational elements for authentication, but relying solely on them is inherently a risky proposal.</p><p>Firstly, there’s the reality that API keys are not securely designed — they were never meant to be used as the sole form of authentication, and as such, they aren’t really built for the task. These keys can often be easily stolen, leaked, or, in some cases (especially if generated incrementally), outright guessed. An API key is suitable for tracking usage but is poor for security.</p><p>There is also the additional reality that keys in their default state lack some critical functionality. There’s not a lot of verification built-in for identity management, and what does exist offers very little in the way of granular access control.</p><p>Ultimately, solely relying on API keys is a mistake common with novice developers but frighteningly common even in advanced products.</p><p>Best Practices<br>Instead of relying heavily on API keys as a sole mechanism, combine those keys with additional approaches such as OAuth 2.0 or mTLS. Implement rigorous expiration and rotation policies to ensure that keys which are made public are only useful for a short amount of time. Consider more advanced approaches, such as IP whitelisting or device fingerprinting, to add another layer of security atop the API key process."</p><p><a href="https://nordicapis.com/9-signs-youre-doing-api-security-wrong/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nordicapis.com/9-signs-youre-d</span><span class="invisible">oing-api-security-wrong/</span></a></p><p><a href="https://tldr.nettime.org/tags/API" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>API</span></a> <a href="https://tldr.nettime.org/tags/APIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIs</span></a> <a href="https://tldr.nettime.org/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> <a href="https://tldr.nettime.org/tags/APIDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIDesign</span></a> <a href="https://tldr.nettime.org/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
:mastodon: Mike Amundsen<p>Wallarm Releases 2025 API ThreatStats Report, Revealing that APIs are the Predominant Attack Surface </p><p><a href="https://buff.ly/4aEd2fo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/4aEd2fo</span><span class="invisible"></span></a></p><p>"Wallarm's researchers tracked 439 AI-related CVEs, a staggering 1,025% increase from the prior year. Nearly all (99%) were directly tied to APIs, including injection flaws, misconfigurations, and new memory corruption vulnerabilities stemming from AI's reliance on high-performance binary APIs."</p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/agenticAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>agenticAI</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a></p>
:mastodon: Mike Amundsen<p>Strengthen API Access Control with Attribute-Based Authorization</p><p><a href="https://curity.io/blog/strengthen-api-access-control-with-attribute-based-authorization/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">curity.io/blog/strengthen-api-</span><span class="invisible">access-control-with-attribute-based-authorization/</span></a></p><p>"ABAC is a more powerful way to perform fine-grained authorization. However, you must be aware of where your APIs take the attributes from to perform authorization decisions. The attributes must come from a reputable source, and the API must be sure that no one has tampered with them." -- <a href="https://mastodon.social/tags/MichalTrojanowski" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MichalTrojanowski</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/oAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oAuth</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a></p>
:mastodon: Mike Amundsen<p>Secrets Management Core Practices</p><p><a href="https://dzone.com/refcardz/secrets-management-core-practices" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dzone.com/refcardz/secrets-man</span><span class="invisible">agement-core-practices</span></a></p><p>"This Refcard delves into the core practices of secrets management, common challenges, and its pivotal role in modern security environments, providing a comprehensive guide for organizations aiming to enhance the security posture of their secrets management strategy." -- <a href="https://mastodon.social/tags/ApostolosGiannakidis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApostolosGiannakidis</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/secretsManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secretsManagement</span></a></p>
:mastodon: Mike Amundsen<p>Common Risks Associated with APIs</p><p><a href="https://apichangelog.substack.com/p/common-risks-associated-with-apis" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apichangelog.substack.com/p/co</span><span class="invisible">mmon-risks-associated-with-apis</span></a></p><p>"You can group API risks into at least five categories: security, performance, operational, data integrity, and business. Each one of these categories has its implications and specific mitigation strategies. Let's look at each in more detail to understand what we're dealing with." -- <a href="https://mastodon.social/tags/BrunoPedro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BrunoPedro</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/apiDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiDesign</span></a></p>
:mastodon: Mike Amundsen<p>Fuzzing JSON to find API security flaws</p><p><a href="https://danaepp.com/fuzzing-json-to-find-api-security-flaws" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">danaepp.com/fuzzing-json-to-fi</span><span class="invisible">nd-api-security-flaws</span></a></p><p>"When it comes to API hacking, fuzzing JSON payloads can expose some interesting security vulnerabilities." -- <a href="https://mastodon.social/tags/DanaEpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DanaEpp</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/JSON" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JSON</span></a></p>
Matthew Reinbold<p>Ever wonder how secure your smart home devices really are? 🔐 The latest Net API Notes article dives into a real-life API vulnerability that put millions of COX modems at risk. Discover four crucial API security questions any API producer should consider! 🏡💻 <a href="https://opinuendo.com/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> <a href="https://opinuendo.com/tags/SmartHome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmartHome</span></a> <a href="https://opinuendo.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://opinuendo.com/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://opinuendo.com/tags/APIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIs</span></a></p><p><a href="https://netapinotes.com/uncovering-api-vulnerabilities-lessons-from-the-cox-modem-breech/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netapinotes.com/uncovering-api</span><span class="invisible">-vulnerabilities-lessons-from-the-cox-modem-breech/</span></a></p>
:mastodon: Mike Amundsen<p>OAuth: "grant" vs "flow" vs "grant type"</p><p><a href="https://aaronparecki.com/2024/03/29/3/oauth-terminology" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aaronparecki.com/2024/03/29/3/</span><span class="invisible">oauth-terminology</span></a></p><p>"Is it called an OAuth 'grant' or a 'flow'? What about 'grant type'?" -- <a href="https://mastodon.social/tags/AaronParecki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AaronParecki</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a></p>
:mastodon: Mike Amundsen<p>Using OPA To Achieve Zero-Trust APIs</p><p><a href="https://nordicapis.com/using-opa-to-achieve-zero-trust-apis/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nordicapis.com/using-opa-to-ac</span><span class="invisible">hieve-zero-trust-apis/</span></a></p><p>"Open Policy Agent takes this one step further, presenting a unified but decentralized open-source solution for setting standards for authorization. By adopting OPA, you get the best of both worlds — a decentralized stack that still has a unified policy engine. " -- <a href="https://mastodon.social/tags/KristopherSandoval" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KristopherSandoval</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/OPA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPA</span></a></p>
Nicolas Fränkel 🇺🇦🇬🇪<p>I lastly stumbled upon a list of 16 practices to secure your <a href="https://mastodon.top/tags/APIs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APIs</span></a>. In this two-post series, I’d like to describe how we can implement each item with <a href="https://mastodon.top/tags/ApacheAPISIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheAPISIX</span></a> (or not).</p><p><a href="https://blog.frankel.ch/secure-api-practices-apisix/1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.frankel.ch/secure-api-pra</span><span class="invisible">ctices-apisix/1/</span></a></p><p><a href="https://mastodon.top/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.top/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a></p>
:mastodon: Mike Amundsen<p>Shadow APIs are opening organizations to attacks: Report</p><p><a href="https://www.csoonline.com/article/1288864/shadow-apis-are-opening-organizations-to-attacks-report.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/1288864/</span><span class="invisible">shadow-apis-are-opening-organizations-to-attacks-report.html</span></a></p><p>"Organizations are either failing to fully defend themselves or are relying on incomplete protection of APIs without real-time visibility" -- <a href="https://mastodon.social/tags/ShwetaSharma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShwetaSharma</span></a></p><p><a href="https://mastodon.social/tags/api360" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api360</span></a> <a href="https://mastodon.social/tags/apiSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiSecurity</span></a> <a href="https://mastodon.social/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a></p>