#APIsecurity

2025-05-02

Didn't make it out to #RSAC 2025 this week? ๐Ÿ˜ No worries. For those of you who didn't catch Graylog at the conference, Seth Goldhammer is here to share some of #Graylog + #RSA with you. ๐Ÿ™Œ

We had a great time showing off what's new in Graylog 6.2 this weekโ€”including our new detection chain capability. Watch below and learn all about it! ๐Ÿ“บ ๐Ÿ‘€ graylog.org/post/introducing-g #cybersecurity #SIEM #APIsecurity

2025-05-01

It's been a great week at #RSA! And, you have one last chance to see us in-person, today. Got questions about the new #Graylog 6.2? Let's talk about data routing + Graylogโ€™s provided data lake, our adversary informed defense, context-aware AI assistance via LLMs that analyze investigation evidence in real time, and more.

graylog.org/rsa-2025/ #RSAC #RSAC2025 #SIEM #APIsecurity

:mastodon: Mike Amundsenmamund
2025-04-30

5 Ways to Secure Agentic Access to APIs | Nordic APIs | buff.ly/EfQmZis

"This shift from human-driven API calls to autonomous and large-scale agentic interactions means that security must become more dynamic, more machine-centric, and based on workloads rather than simple identity." --

Katie Paxton-Fear (InsiderPhD)insiderphd@infosec.exchange
2025-04-30

Had a blast at the API security happy hour, and not just 'cause it was in a pub!๐Ÿป Big thanks to all who shared how my content helped you - your stories mean the world to me!๐Ÿ˜Š #APIsecurity #RSAC2025

2025-04-29

Hey hey, #RSA! Welcome to Tuesday. ๐Ÿ‘‹ ๐ŸŒ… See us today, in #3134 to...

๐Ÿค Connect with our amazing team, in-person
๐Ÿ’ก Learn all about #SIEM without compromise
๐Ÿ›๏ธ Get your stickers, key chains, fancy water bottles, โž•more
๐Ÿ—ฃ๏ธ Talk about the new Illuminate Content Hub in 6.2
...and so much more.

Want a personalized demo with our experts? We got ya. C'mon over! ๐Ÿ–ฅ๏ธ graylog.org/rsa-2025/ #cybersecurity #RSAC #RSAC2025 #APIsecurity #security

Marco Ciappelli๐ŸŽ™๏ธโœจ:verified: :donor:Marcociappelli@infosec.exchange
2025-04-22

๐ŸŒ The Digital Terrain Is Shifting โ€” Are Your Apps and APIs Ready?

As AI adoption accelerates, so do AI-driven attacks.
In their new research report, Akamai Technologies uncovers the evolving threats facing web applications and APIs โ€” and how organizations can respond before attackers get ahead.

State of Apps and API Security 2025: How #AI Is Shifting the Digital Terrain explores the sharp rise in automated, intelligent threats โ€” and the new defenses emerging to meet them.

๐Ÿ“ฅ Download the full report here: itspm.ag/akamaixmwd
๐Ÿ“Œ Research like this helps #security professionals, #leaders, and #developers stay ahead of the curve โ€” and shape the future of #digital defense.

๐ŸŽ™๏ธ Weโ€™re also proud to feature Akamai in our RSAC 2025 coverage โ€” with a Brand Story recorded pre-event and a follow-up conversation happening on location at the conference in San Francisco with Rupesh Chokshi, Sean Martin, CISSP, and Marco Ciappelli.

Watch the pre-event recording here: youtu.be/DMm6INJ_2Z8

๐Ÿ™ A huge thank you to the Akamai team for sponsoring our coverage and sharing their insights with our global audience.

๐Ÿ‘‡ Check out the report and stay tuned for more from RSAC:

๐Ÿ“ฅ Download the Report: itspm.ag/akamaixmwd
๐ŸŒ Explore our RSAC 2025 Coverage: itspmagazine.com/events/rsac-2

#akamai #rsac2025 #brandstory #apigateway #applicationsecurity #aiinsecurity #webappsecurity #cybersecurityresearch #infosec #devsecops #digitaldefense #threatintelligence #itspmagazine #rsaconference #apisecurity #aiattacks #securityreport #cybersecurityinnovation #securitystrategy #zerotrust #appsec

2025-04-22

Going to apidays NYC? Don't miss this preso by Jeff Zemerick and #Graylog's Rob Dickinsonโ€”Catching the Quiet Thief: Detecting Low-and-Slow #API Data Exfiltrations in Real Time. ๐Ÿฆน

This session explores how attackers exploit #APIs for long-term data theft and how runtime monitoring with full payload visibility helps detect and block them.

Learn how PII-aware detection, risk scoring, and real-time response can uncover threats hiding in plain sightโ€”before they become data breaches.

4:05 PM ET, Wednesday, May 14th. apidays.global/new-york/ #cybersecurity #APIsecurity

2025-04-18

It's almost time for #RSAC2025! โฐ ๐ŸŽŠ We'll be there, in Moscone South #3134, showcasing our Spring โ€˜25 release. ๐ŸŽ‰

๐Ÿ‘€ Want to see what's new? Get a live demo of the latest Graylog Security release โ€” a platform purpose-built for mid-enterprise #security teams that demand speed, accuracy, and efficiency.

Stop by, say hi, and see Graylog in action at #RSA. graylog.org/rsa-2025/ #cybersecurity #APIsecurity #SIEM

2025-04-03

Verizon Call Filter API flaw exposed customer call history without authentication. #Verizon #APIsecurity #DataBreach

More details: thedefendopsdiaries.com/unders - flagthis.com/news/12390

Opalsec :verified:Opalsec@infosec.exchange
2025-04-03

Staying ahead means staying informed, right? Here's our latest wrap of the day's Cyber News:

๐Ÿ—ž๏ธ opalsec.io/daily-news-update-t

If you're short on time, hereโ€™s a quick whip-around of the top 3 stories of note:

๐Ÿ•ต๏ธโ€โ™‚๏ธ Hunters Ransomware Rethink: Is the heat getting too much? Hunters International leadership reportedly told affiliates ransomware is now too "risky," planning a shift to pure data theft/extortion under a "World Leaks" banner. While their current status is murky, this potential pivot away from encryption echoes moves by other groups and highlights how defensive pressures are forcing attacker evolution โ€“ something we all need to track.

๐Ÿ“ง White House OpSec Woes: Remember that recent White House Signal mishap? Well, now the same National Security Adviser is reportedly facing heat for using personal Gmail for sensitive (if unclassified) government discussions, raising serious OpSec and compliance alarms. It's a potent reminder for us all: even seemingly benign comms on personal platforms can create significant risks, and basic security hygiene is non-negotiable, especially when sensitive info is involved.

๐Ÿ“ž Verizon API Call Log Leak: Hereโ€™s a worrying find: a simple API flaw in Verizon's Call Filter app exposed the incoming call history of potentially all their wireless customers to each other. Technically, it was a textbook case of broken object-level authorization โ€“ the API didn't check if the user's token matched the phone number whose logs were requested in a header. This highlights the critical need for robust API authorization checks and the significant privacy impact even call metadata can have.

Have a read of the full newsletter, and sign up to get all the details straight to your inbox each day:

๐Ÿ“จ opalsec.io/daily-news-update-t

#CyberSecurity #InfoSec #ThreatIntel #Ransomware #DataBreach #DataLeak #Vulnerability #APIsecurity #CloudSecurity #SupplyChainSecurity #Malware #Privacy #CyberAttack #InfoSecNews #ThreatHunting #CISCO #Verizon #GitHub #NationalSecurity #AndroidSecurity #EDR #CyberAwareness

Miguel Afonso Caetanoremixtures@tldr.nettime.org
2025-04-03

"API keys are foundational elements for authentication, but relying solely on them is inherently a risky proposal.

Firstly, thereโ€™s the reality that API keys are not securely designed โ€” they were never meant to be used as the sole form of authentication, and as such, they arenโ€™t really built for the task. These keys can often be easily stolen, leaked, or, in some cases (especially if generated incrementally), outright guessed. An API key is suitable for tracking usage but is poor for security.

There is also the additional reality that keys in their default state lack some critical functionality. Thereโ€™s not a lot of verification built-in for identity management, and what does exist offers very little in the way of granular access control.

Ultimately, solely relying on API keys is a mistake common with novice developers but frighteningly common even in advanced products.

Best Practices
Instead of relying heavily on API keys as a sole mechanism, combine those keys with additional approaches such as OAuth 2.0 or mTLS. Implement rigorous expiration and rotation policies to ensure that keys which are made public are only useful for a short amount of time. Consider more advanced approaches, such as IP whitelisting or device fingerprinting, to add another layer of security atop the API key process."

nordicapis.com/9-signs-youre-d

#API #APIs #APISecurity #APIDesign #WebSecurity #CyberSecurity

2025-04-02

API security firm APIsec's exposed database leaked customer data. #APISecurity #DataBreach #Cybersecurity

More details: upguard.com/breaches/data-leak - flagthis.com/news/12270

2025-03-29

#APIs act as digital portals that allow data to travel between applications. ๐Ÿ•ณ๏ธ However, as sensitive data moves from one application to another, each API becomes a potential access point that threat actors can exploit. ๐Ÿ˜ฌ

๐Ÿ”’ Securing APIs is critical to any company's data protection program, and knowing the OWASP API security top 10 will help! ๐Ÿ”Ÿ ๐Ÿ™Œ

Read on an learn about:
โ“ Who OWASP is
โš ๏ธ The 10 most critical API security risks based on several data points
๐Ÿ”“ The OWASP top 10 API security risks

graylog.org/post/an-introducti #cybersecurity #infosec #APIsecurity #GraylogLabs

2025-03-27

Did someone say FREE training? ๐Ÿ‘€ ๐Ÿ†“ ๐Ÿ˜ Welcome to #Graylog Academy! ๐Ÿ‘‹ We are excited to give you the tools to gain immediate value, unlock #security analytics, and begin data driven decision-making as you embark upon (or continue) your journey with Graylog. ๐Ÿš€

Check out the awesome selection of FREE courses you can take, including:
โžก๏ธ Adding Context and Enriching Your Log Data
โžก๏ธ Events, Alerts, and Notifications
โžก๏ธ Hardening Graylog with TLS
โžก๏ธ Intro to API Security
โžก๏ธ Introduction to Graylog Dashboards
โžก๏ธ Pipelines, Parsing and the Graylog Information Model

Did we mention that many of the courses are ๐Ÿ†“ โ‰๏ธ What are you waiting for! Let's go. ๐Ÿƒ๐Ÿ’จ

academy.graylog.org/home #APIsecurity #SIEM #logmanagement #cybersecurity #infosec

2025-03-24

It was a packed house for the Graylog #BSidesROC Capture The Flag on Saturday! ๐Ÿ  ๐ŸŽ‰ Thank you to everyone who joined us for the fun and games. ๐ŸŽฎ ๐Ÿ’ป You are all amazing and, now, a little (or a lot!) more knowledgable about #Graylog! ๐Ÿ’ก It's a win-win. ๐Ÿ˜ƒ ๐Ÿ‘

And congrats to our challenge winners!
๐Ÿ† Grand prize winner โ€” Tyler Smith
๐ŸŽŸ๏ธ Training voucher winner โ€” Praveen Kumar Penukonda
๐Ÿ… Runner up โ€” Gabriel Schickling

#CTF #cybersecurity #APIsecurity #SIEM #SIEMdoneright #GraylogCTF

2025-03-19

Threat actors are increasingly using cloud services to identify the data they intend to exfiltrate or ransom. Cloud native development, containers, and microservices allow dev teams to quickly deploy new builds. But, they also lead to a higher potential for misconfiguration. And where there are misconfigurations there are vulnerabilities that leave openings for threat actors. โ˜ ๏ธ ๐Ÿ˜ฆ

So, what can #security teams do about this? ๐Ÿค” They can shine a spotlight on whatโ€™s in their #API traffic! ๐Ÿ”ฆ Once you know how #cybercriminals are accessing sensitive data, you can stop them from gaining access to it. ๐Ÿ›‘

Critical security steps need to happen before data exfiltration does. Learn more about predicting risk and closing your vulnerability gap, in this article by #Graylog's Seth Goldhammer.

securityboulevard.com/2025/03/ #cybersecurity #APIsecurity #infosec

Ionut Balosinionutbalosin
2025-03-18

๐Ÿš€ New article: Strengthen your Java app's security with API authentication, CSP, CORS, and HTTP security headers.

Dive into this comprehensive guide for Java developers: API Web Application Security

ionutbalosin.com/2025/03/api-w

2025-03-17

APIs often handle vast amounts of Personally Identifiable Information (#PII), which makes them prime targets for API data exfiltration. ๐ŸŽฏ๐Ÿ˜’ So, it's no surprise that #API-based attacks with the aim of stealing sensitive data have increased over time. Many orgs also lack visibility into which APIs are handling PII, which leaves them with massive #security blind spots. ๐Ÿ˜ณ

What should orgs do about this? Let's take a closer look at:
๐Ÿšฆ The growing risks of PII exposure in API traffic
๐Ÿ”“ The methods attackers use to exfiltrate data
๐Ÿ‘€ Capabilities to look for in a data exfiltration prevention solution
๐Ÿ’ฅ How the new release of Graylog API Security 3.7 can help

graylog.org/post/apis-the-sile #APIsecurity #APIs #cybersecurity

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst