API

  • Blog

    Cloudflare now blocks all unencrypted traffic to its API endpoints

    Cloudflare announced that it closed all HTTP connections and it is now accepting only secure, HTTPS connections for api.cloudflare.com. The move prevents unencrypted API requests from being sent, even accidentally, to eliminate the risk of sensitive information being exposed in cleartext traffic before the server closes the HTTP conection and redirects to a secure communication channel. “Starting today, any unencrypted connection…

    Read More »
  • Blog

    Rising API Vulnerabilities Demand a Multi-Layered Defense

    APIs as a Critical Asset Under Threat An application programming interface (API) is the foundation of modern digital ecosystems, enabling seamless communication and interoperability between various applications, services, and platforms. It facilitates data exchange and accelerates the deployment of advanced technologies across industries, from finance and healthcare to e-commerce and cloud computing. However, as APIs become more integral to business…

    Read More »
  • Blog

    Have Some Spare Cash? You’ll Need it for OpenAI’s New API

    OpenAI researcher Hyung Won Chung. Image: OpenAI/YouTube Reasoning models, which dedicate time to thoroughly thinking through prompts, are at the front of the generative AI pack. OpenAI announced on March 20 o1-pro, a heavy-duty version of one of its reasoning models. Developers on any of OpenAI’s paid tiers can find o1-pro in the OpenAI API starting today. Those with higher…

    Read More »
  • Blog

    12,000 API keys and passwords were found in a popular AI training dataset – experts say the issue is down to poor identity management

    The discovery of almost 12,000 valid secrets in the archive of a popular AI training dataset is the result of the industry’s inability to keep up with the complexities of identity management, experts have told ITPro. Researchers at Truffle Security found nearly 12,000 ‘live’ API keys and passwords when analysing the Common Crawl archive used to train open source LLMs…

    Read More »
  • Blog

    Strategies for Cloud Contact Center Platform API Management

    Cloud contact centers connect agents with customers across multiple channels, including voice, email, SMS, social media, live chat, and more. Cloud contact center platform API management plays a critical role in maintaining all of these channels. Unlike traditional on-premises phone systems and hosted contact center solutions, cloud contact centers aren’t bound by physical locations or servers. Instead, all of your…

    Read More »
  • Blog

    Security researchers set up an API honeypot to dupe hackers – and the results were startling

    Attackers are quick off the mark in targeting and accessing APIs to enter company networks and steal data, according to the results of an API ‘honeypot’. API security firm Wallarm set up their trap last month, and has now reported on its first 20 days of activity. “We expected that it might take longer to have compelling data to report,…

    Read More »
  • Blog

    API attacks are spiraling out of control

    More than eight-in-ten UK organizations experienced an API attack last year, according to new research, and it’s costing them a fortune to remediate. Analysis from Akamai found that the number of API-related attacks soared from 69% in 2023 to 83% this year – and the situation’s worse when it comes to the UK’s critical infrastructure. The study noted that 94.1%…

    Read More »
  • Blog

    DocuSign’s Envelopes API abused to send realistic fake invoices

    Threat actors are abusing DocuSign’s Envelopes API to create and mass-distribute fake invoices that appear genuine, impersonating well-known brands like Norton and PayPal. Using a legitimate service, the attackers bypass email security protections as they come from an actual DocuSign domain, docusign.net. The goal is to have their targets e-sign the documents, which they can then use to authorize payments…

    Read More »
  • Blog

    Exploitation of Docker remote API servers has reached a “critical level”

    Hackers are exploiting unprotected Docker remote API servers to deploy malware, with researchers stating the threat has reached a “critical level” and warning organizations to act now. A report from Trend Micro published on 21 October details how researchers observed an unknown threat actor abusing exposed docker remote API servers to deploy the ‘perfctl’ malware. The attack sequence begins with…

    Read More »
  • Blog

    API and bot attacks are costing businesses billions – and they’re on the rise

    Insecure Application Programming Interfaces (APIs) and bot attacks are costing organizations billions, with large companies particularly at risk. In a new analysis of more than 161,000 unique cybersecurity incidents, the security firm Imperva found that API-related security incidents rose by 40% across 2022 and by a further 9% in 2023. Bot-related security incidents rose by 88% across the same period.…

    Read More »
Back to top button
close