Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

Post iOS Jailbreak Customization: Exploring iOS Tweaks & Private APIs

If you have ever jailbroken an iOS device, you have likely encountered many things that we will discuss today. Let's start with one of the most commonly used terms that gets thrown around: iOS tweaks. There are plenty of them out there, depending on the needs - whether for fun or profit, simple or complex - ranging from making your lock screen look fancy to running your banking app on a jailbroken device.

Two of Wallarm's Open-source Tools Have Been Accepted into Black Hat Arsenal 2024

We're gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek - not just one, but TWO of Wallarm's open-source tools will be featured in the Arsenal showcase at Black Hat USA this year. Black Hat Arsenal unites researchers and the open-source community to display their newest open-source tools and products, allowing presenters to engage directly with attendees. Its schedule is now live, so save the date to watch presentations of API Firewall and GoTestWAF.

Streamline Compliance and Strengthen Data Protection Using Netskope's Integration with the ChatGPT Enterprise Compliance API

In the ever-evolving landscape of AI, maintaining compliance standards and ensuring secure usage of generative AI applications remains an important priority for enterprises. Across the globe, regulatory frameworks like the European Union’s AI Act have been established to ensure that AI systems are developed and deployed in a manner that prioritizes safety, transparency, ethics, and fundamental rights.

The Biggest Factors Influencing API Security Today

Application Programming Interfaces (APIs), with their ability to enable different software systems to communicate, have helped shape the digital world irrevocably. They allow developers to create more interoperable, scalable, efficient, and innovative digital services and applications across important industries such as retail, finance, manufacturing, and healthcare. However, with the explosion of API creation and usage comes inevitable risks.

15 Best API Security Tools in the Market in 2024

As the importance of APIs continues to grow and API traffic accelerates, ensuring their secure functionality is no longer an option—it is a necessity. Just think about recent hacks like the ones at T-Mobile and Finsify’s Money Lover app – which left millions of users exposed and vulnerable. As cyber threats evolve faster than ever, the quest for the perfect API security solution becomes a mission. With so many options, how do you know which fits your needs?

Secure API Management for LLM-Based Services

API Management is a comprehensive process that involves creating, publishing, documenting, and overseeing application programming interfaces (APIs) in a secure, scalable environment. APIs are the backbone of modern software architecture, enabling interoperability and seamless functionality across diverse applications. They facilitate the integration of different software components, allowing them to intercommunicate and share data efficiently.

Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk

Polyfill.io helps web developers achieve cross-browser compatibility by automatically managing necessary polyfills. By adding a script tag to their HTML, developers can ensure that features like JavaScript functions, HTML5 elements, and various APIs work across different browsers. Originally developed by Andrew Betts, Polyfill.io injects JavaScript polyfill libraries based on the user agent or other characteristics, streamlining code maintenance.

Salt Security Empowers API Governance with New Posture Policies Hub

In today's digital age, applications are no longer monolithic structures but intricate mosaics of interconnected APIs. These APIs are the foundation of modern software and allow for smooth communication and data exchange, providing the dynamic functionality users expect. However, as connectivity increases, so does the risk of exposure to cyberattacks. The security of APIs has become extremely important as cyber threats target these crucial points.