mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#apisecurity

1 Beitrag1 Beteiligte*r0 Beiträge heute

What would you do if you discovered a #bug or #loophole that provided free lifetime service instead of the usual annual or monthly fees? I've been trying to reach out to the company for a year, sending emails and requesting contact with their #development or #security team, but I haven't received a response.

The #CEO is active on #X and #Meta, but I don't have accounts on those platforms but I can't contact him directly anyway since DMs are disabled. Any suggestions?

The service still works after a year of using it.

🚀 New Brand Story from #RSAC2025: Runtime Protection at the New Digital Front Line

At #RSAC Conference 2025, Sean Martin, CISSP sat down with Rupesh Chokshi, Senior Vice President and GM of Application Security at Akamai Technologies, to talk about how AI-driven applications and #APIs are reshaping the security landscape.

🔐 Why are runtime attacks on APIs and #AI apps growing—and why is prevention alone no longer enough?

Find out how Akamai is evolving its Web Application and API Protection (#WAAP) strategies to meet these emerging threats head-on.

🎙️ Watch, listen, or read the full story here:
👉 itspmagazine.com/their-stories

ITSPmagazineThe New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story — ITSPmagazine | Broadcasting Ideas. Connecting Minds.™In this episode, Rupesh Chokshi of Akamai breaks down the surge in API and AI-driven threats and explains how Akamai’s new Firewall for AI helps CISOs manage risk without slowing innovation. With real-world data, sharp insights, and practical solutions, this episode is a must-listen.

🌐 The Digital Terrain Is Shifting — Are Your Apps and APIs Ready?

As AI adoption accelerates, so do AI-driven attacks.
In their new research report, Akamai Technologies uncovers the evolving threats facing web applications and APIs — and how organizations can respond before attackers get ahead.

State of Apps and API Security 2025: How #AI Is Shifting the Digital Terrain explores the sharp rise in automated, intelligent threats — and the new defenses emerging to meet them.

📥 Download the full report here: itspm.ag/akamaixmwd
📌 Research like this helps #security professionals, #leaders, and #developers stay ahead of the curve — and shape the future of #digital defense.

🎙️ We’re also proud to feature Akamai in our RSAC 2025 coverage — with a Brand Story recorded pre-event and a follow-up conversation happening on location at the conference in San Francisco with Rupesh Chokshi, Sean Martin, CISSP, and Marco Ciappelli.

Watch the pre-event recording here: youtu.be/DMm6INJ_2Z8

🙏 A huge thank you to the Akamai team for sponsoring our coverage and sharing their insights with our global audience.

👇 Check out the report and stay tuned for more from RSAC:

📥 Download the Report: itspm.ag/akamaixmwd
🌐 Explore our RSAC 2025 Coverage: itspmagazine.com/events/rsac-2

#akamai#rsac2025#brandstory

"API keys are foundational elements for authentication, but relying solely on them is inherently a risky proposal.

Firstly, there’s the reality that API keys are not securely designed — they were never meant to be used as the sole form of authentication, and as such, they aren’t really built for the task. These keys can often be easily stolen, leaked, or, in some cases (especially if generated incrementally), outright guessed. An API key is suitable for tracking usage but is poor for security.

There is also the additional reality that keys in their default state lack some critical functionality. There’s not a lot of verification built-in for identity management, and what does exist offers very little in the way of granular access control.

Ultimately, solely relying on API keys is a mistake common with novice developers but frighteningly common even in advanced products.

Best Practices
Instead of relying heavily on API keys as a sole mechanism, combine those keys with additional approaches such as OAuth 2.0 or mTLS. Implement rigorous expiration and rotation policies to ensure that keys which are made public are only useful for a short amount of time. Consider more advanced approaches, such as IP whitelisting or device fingerprinting, to add another layer of security atop the API key process."

nordicapis.com/9-signs-youre-d

Nordic APIs · 9 Signs You're Doing API Security Wrong | Nordic APIs |API security anti-patterns are common. From overreliance on API keys to a lack of rate limiting to no encryption, we explore the top ones.
#API#APIs#APISecurity

It was a packed house for the Graylog #BSidesROC Capture The Flag on Saturday! 🏠 🎉 Thank you to everyone who joined us for the fun and games. 🎮 💻 You are all amazing and, now, a little (or a lot!) more knowledgable about #Graylog! 💡 It's a win-win. 😃 👏

And congrats to our challenge winners!
🏆 Grand prize winner — Tyler Smith
🎟️ Training voucher winner — Praveen Kumar Penukonda
🏅 Runner up — Gabriel Schickling

Wallarm Releases 2025 API ThreatStats Report, Revealing that APIs are the Predominant Attack Surface

buff.ly/4aEd2fo

"Wallarm's researchers tracked 439 AI-related CVEs, a staggering 1,025% increase from the prior year. Nearly all (99%) were directly tied to APIs, including injection flaws, misconfigurations, and new memory corruption vulnerabilities stemming from AI's reliance on high-performance binary APIs."

Node.js Security in 2025: Best Practices and Threat Mitigation

bloggingaadd.com/nodejs-securi

Learn the best Node.js security practices for 2025 to protect your applications from evolving threats. Explore key strategies for threat mitigation, data protection, and secure coding.

#NodeJS
#CyberSecurity
#WebSecurity
#SecureCoding
#BackendDevelopment
#APISecurity
#TechTrends2025
#DataProtection
#SoftwareSecurity
#JavaScript
#SecureApps
#ThreatMitigation