News

Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.
Erlang/OTP SSH, a set of libraries for the Erlang programming language, carries a maximum-severity vulnerability that allows for remote code execution and is “surprisingly easy” to exploit ...
Threat protection: How can attackers exploit your APIs? API security programs must protect against three common attack patterns: denial of service, abuse of functionality and vulnerability exploits.
Security researchers say a pair of easy-to-exploit flaws in a popular remote-access tool used by more than a million companies around the world are now being mass exploited, with hackers abusing the ...
If these trends continue, we could see up to 17 new API exploits per day.
API security challenges: The weaknesses of tokens When looking to exploit an API, threat actors will often try to harvest client credentials and API keys to obtain access to the underlying data.
Traceable AI raises $60 million to enhance its API security platform to help enterprises protect themselves from API-based attacks.
Security researchers say a pair of easy-to-exploit flaws in a popular remote-access tool used by more than a million companies around the world are now being mass exploited, with hackers abusing ...