Mobile app developers keep hearing that they shouldn’t store API keys in their app code but they don’t hear where they should store them. In this article we discuss the topic and provide some practical solutions.
The post How Should API Keys be S…
Tag: API Abuse
Europe, Global Security News, North America
How to Prevent API Abuse
by David Stewart •
API abuse, when the API is used in an unexpected way, is a growing problem in software development and one of the leading attack vectors cybercriminals exploit. According to a recent security research report that surveyed more than 200 enterprise…
Europe, Global Security News, North America
How Can I Protect My Mobile API?
by David Stewart •
As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow developers to quickly and efficiently access the data and functionality they need to build amazing apps. This article outlines a 5 step checklist to mak…
Europe, Global Security News, North America
What is Mobile App Shielding?
by David Stewart •
As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile apps. In fact, according to a recent 2021 cybersecurity study by Checkpoint, 46% of organizations had at least one employee download a malicious mobile…
Europe, Global Security News, North America
Multi-Tenant SaaS Authentication Bypass or Works-as-Designed?
by Jason Kent •
Four months ago, researchers at Cequence discovered an authentication vulnerability in the Lithium community forum platform (now part of Khoros), that warranted a responsible disclosure submission. The vulnerability impacts Khoros customers using the L…
Europe, Global Security News, North America
7 Ways to Defend Mobile Apps and APIs from Cyberattacks
by David Stewart •
Editor’s note: This post was originally published in September 2021 in Threatpost.
There are two essential elements driving progress in today’s digital-first economy: Mobile applications and APIs. An API (Application Programming Interface) is sof…