FEATURED BLOG

LoNg4j Findings Confirm Log4j Vulnerability Patching Gaps

Roughly a year ago, IT and application security teams experienced a dark time. We found out that our logging systems were vulnerable to a specific attack that allowed an attacker

RSAC

Explore Blog Posts

dropdown-arrow
CQ Prime Threat Research
OWASP API Vulnerabilities Exploited to Bypass API Security

October 20, 2022

The recent string of security incidents and data breaches highlights how attackers are leveraging OWASP categorized security gaps to execute...

CQ Prime Threat Research
API Security Lacking for Ecosystem and Third-Party APIs?

October 18, 2022

Long before APIs exploded into mainstream use, organizations used them to support and grow their partner ecosystem. Third-party APIs enable...

CQ Prime Threat Research
New API Threat Research Shows that Shadow APIs Are the Top Threat Vector

October 04, 2022

New research by the Cequence CQ Prime Threat Research team confirms shadow APIs are the top threat challenging the industry...

CQ Prime Threat Research
What are API Keys and Why Do I Need API Key Security?

September 13, 2022

Have you ever thought about how different apps and devices connect to each other, from the car that tells you...

CQ Prime Threat Research
Credential Stuffing Attack & Residential Proxy Bulletin Lacking in Detail

September 08, 2022

The FBI is warning security professionals to be on the lookout for increased use of residential proxies to execute a...

CQ Prime Threat Research
Network IQ: How the Largest API Threat Database Protects Your APIs

August 09, 2022

Introduction It’s Christmas and your child wants the new PS5 game console – just like everyone else. As a doting...