News

How Unprotected Devices are Fueling the API Security Crisis When it comes to protecting critical business applications, API ...
I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most common API security myths. From zombie endpoints to the limits of WAFS ...
Wallarm has raised money in a Series C funding round led by Toba Capital, which brings the total raised by the company to ...
Wallarm, the leader in API and AI security, today announced the launch of its next-gen Security Edge offering, delivering the benefits of edge-based API protection to more teams, in more environments, ...
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter ...
Salt Security, the leader in API security, today announced the launch of Salt Surface, a new capability integrated into its industry-leading API Protection Platform. Salt Surface provides ...
Exposed API documentation is a gift-wrapped roadmap for threat actors. The free Autoswagger tool from Intruder scans for exposed docs and flags endpoints with broken access controls—before attackers ...
Wix's newly acquired 'vibe coding' platform, Base44, had a critical authentication vulnerability allowing unauthorized access ...
Since threat actors are actively abusing security weaknesses, businesses need to implement a “robust, proactive API security strategy,” says Roey Eliyahu, co-founder and CEO, Salt Security.