fbpx

John Jeremiah

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

API Hacking 101

API Hacking 101

Learn the basics of API hacking including what they are, the API security top 10, and how you can test for vulnerabilities in your APIs.

A New Perspective from Log4shell: Exploit Prevention from Containers to APIs

A New Perspective from Log4shell: Exploit Prevention from Containers to APIs

There is no fixed perimeter in the cloud, as microservices and applications connect through APIs. In the cloud, containers are created and destroyed depending on business demand, your infrastructure isn’t permanent, rather it’s ephemeral. Learn how to approach security in cloud native and containers.

Bigger Organizations Have Multiple Attack Surfaces

Bigger Organizations Have Multiple Attack Surfaces

Nowadays, protecting within the organization is table stakes, and we have to go beyond the four walls, we have to go and make sure that not only do we protect our organization, we also have to consider the ecosystem of our partners, the supply chain consisting of other third parties. These third parties and multiple stakeholders are going to interact with our systems, and we are going to interact with their systems using APIs. So, when we start interacting with APIs, cloud and SaaS models, the overall system is no longer within four walls or defined boundaries.

Hacking APIs

Hacking APIs

Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.