Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Other Crowdstrike Outage

On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic error that caused Windows systems to crash, resulting in widespread BSOD (Blue Screen of Death) incidents. The impact was severe, disrupting critical infrastructure globally, from grounded flights to halted public transit systems. In fact, you’d have to have been living under a rock to have missed this incident.

Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats Report

As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our latest Q2 ThreatStats Report reveals critical trends and developments that are reshaping the security environment. Continuing from our Q1 findings, the surge in AI API vulnerabilities is not only persisting but intensifying, with an alarming increase in both the volume and severity of exploits.

TracFone Breach Underscores Critical Need for Mobile Carrier API Security

The recent Federal Communications Commission (FCC) settlement with TracFone Wireless, Inc. (TracFone) for $16 million highlights a critical vulnerability within the mobile telecommunications industry: API security. The investigation revealed unauthorized access to customer data through weaknesses in TracFone's mobile carrier APIs. This incident reminds mobile carriers to prioritize robust API security measures to safeguard customer data and ensure network integrity.

Time is of the Essence: Shrinking MTTR in API Security

In the fast-paced world of cybersecurity, every second counts. When an API attack occurs, the speed at which your security team can detect, understand, and respond to the threat can mean the difference between a minor incident and a major data breach. This is where Mean Time to Resolve (MTTR) comes into play. MTTR is a key performance indicator (KPI) that measures the average time it takes to resolve a security incident, from the moment it's detected to the point where it's fully mitigated.

How Attackers Use APIs to Disguise Bots as Games Consoles

Attackers and bot authors are continually evolving their methods, shifting their focus beyond just websites. With websites often having a reasonable level of protection, malicious actors are increasingly targeting less-protected areas, namely APIs, with their bots. This blog post delves into the evolving threat landscape. We’ll focus on how attackers exploit APIs and IoT devices to launch attacks like credential stuffing, using streaming services as a prime example.

Gartner Insights: Navigating the Evolving API Protection Market and Taking Action

Securing your API ecosystem is increasingly complex, leaving organizations unsure where to begin. Gartner's 2024 Market Guide for API Protection offers clear guidance: Understanding your API attack surface and prioritizing your security efforts is crucial. Once you have visibility into your API landscape, you can implement appropriate security measures to protect your APIs from abuse and access violations.

Exploring the dynamic landscape of cybersecurity threats

Hello, My name is Chen, and I work as a threat intelligence analyst at Salt Security. Every day, I dive into the complex world of cybersecurity, uncovering the hidden threats that hide in our digital lives. Today, I'd like to take you on a journey through the evolving landscape of API threats. APIs are the quiet helpers of the digital world, allowing software applications to communicate easily with each other.

Beyond the Noise: Achieving Accurate API Inventory with AI

The prevalence of APIs in today's digital environment is undeniable. They are crucial for modern applications, enabling seamless communication and data exchange between different software components. The rise of AI and machine learning has further accelerated API adoption, not only for accessing data and resources but also for rapid API development and deployment.

Salt Security Continues to Innovate as Leader in API Security

The API security landscape is changing rapidly, and cybercriminals are becoming increasingly sophisticated. According to the Salt Labs State of API Security Report 2024, API security incidents have more than doubled in the past 12 months, while API usage is rapidly increasing. Organizations are finding it challenging to keep up with the threats associated with expanding API ecosystems and fully understand their complex behavioral attributes.

The Importance of API Security Governance in a Dynamic Threat Landscape

As noted in the 2024 Gartner Market Guide for API Protection“API security governance is an emerging capability. It allows the administrator of the tool to define and enforce security policies. Unlike posture management, this is a top-down enforcement. It also allows for compliance reports for specific regulations to be generated automatically.” This capability is becoming increasingly important as organizations face a constantly evolving threat landscape.