API Threat Research Validates Robust API Security Program with Automated API Attack Mitigation Capabilities
May 16, 2023
API threat research by the Cequence CQ Prime Threat Research team during the second half of 2022 confirms that API...
Best Practices for Addressing Log4j and LoNg4j Patching Gaps
January 27, 2023
Long after the press news and panic surrounding the discovery of Log4j, the Log4 Shell exploit and the supply-chain variant...
API Security: API10+ Defined as Bots Abusing Well-Formed APIs
January 26, 2023
API business logic abuse, informally defined as as OWASP API10+, an extension to the OWASP API Top 10, is the...
Subscribe for more content and never miss an update!
How BOLA Vulnerabilities Can Expose Sensitive Data: API Security Report
January 24, 2023
New threat research for API security, this blog walks through the discovery of a Broken Object Level Authorization or BOLA...
API Security Bypassed Using Multiple OWASP API Threats
January 20, 2023
Research by the CQ Prime Threat Research Team documents how attackers leveraged multiple OWASP API Top 10 threats including Broken...
API Security Lacking for Ecosystem and Third-Party APIs?
January 18, 2023
Research by the CQ Prime Threat Research Team documents how attackers bypass API security to target third-party and partner eco-system...
New API Threat Research Shows Shadow APIs as the Top Threat Vector
January 15, 2023
API threat research by the Cequence CQ Prime Threat Research team confirms shadow APIs are the top threat challenging the...
Hey API! What you Token?
January 02, 2023
Technology is always evolving with some of it widely adopted, while others never get implemented. In some cases, the technology...
December 20, 2022
We've been working with a client who was getting hit with wave after wave of bot attacks that were easily...