PinnedHacking APIs: Authentication & Authorization AttacksAs you know, API/Endpoints are called from many types of devices to receive information. In terms of security, your API/Endpoints must to…Nov 24, 20232Nov 24, 20232
Hacking APIs :SQL Injection AttackSQL Injection (SQLi) is one of the most common and dangerous vulnerabilities in web applications, allowing attackers to manipulate database…Mar 25Mar 25
Hacking APIs: Authentication AttackAPIs with weak authentication or not control in places are the best targets of attackers or bad guys, leading to unauthorized access and…Mar 25Mar 25
Hacking APIs: Bypassing Rate LimitingRate limiting is a security control to prevent abuse or high number of request to APIs, but threat actor can find ways to bypass this…Mar 19Mar 19
API Security:Why it mattersIn this post, we’ll break down API security in a simple way, talk about why it’s important, and look at some real-world attacks. We’ll also…Feb 22Feb 22
Seguridad en Contenedores: Docker 101 Gestión de ImágenesEn el siguiente artículo describiré algunas aspectos básicos para la gestión de imágenes en docker.May 12, 2024May 12, 2024
Seguridad en Contenedores : Docker 101 FundamentosEn el objetivo de esta serie de articulos relacionados a contenedores es abordar de manera general la tecnologia con el objetivo de…May 9, 2024May 9, 2024
API Security: Essential Tools for Endpoint AnalysisIn today’s digital realm, fortifying APIs (Application Programming Interfaces) is imperative to shield sensitive data and uphold software…Mar 14, 2024Mar 14, 2024