article thumbnail

5 API Vulnerabilities That Get Exploited by Criminals

Security Affairs

APIs have unique threat implications that aren’t fully solved by web application firewalls or identity and access management solutions. This includes weak password complexity or poor password hygiene, missing account lockout thresholds, long durations for password or certificate rotations, or relying on API keys alone for authentication.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

Established web application firewall (WAF) suppliers like Imperva, F5 and Akamai are hustling to strengthen their respective platforms. Stolen usernames and passwords are loaded up on botnets, which then relentlessly test them on account logon pages. Botnets can test stolen usernames and passwords at scale.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global CRM Provider Exposed Millions of Clients’ Files Online

Security Affairs

Researcher discovered that global B2B CRM provider Really Simple Systems exposed online a non-password-protected database with million records. Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to vpnMentor about a non-password protected database that contained over 3 million records.

article thumbnail

Q&A: How your typing and screen swiping nuances can verify your identity

The Last Watchdog

Related podcast: Why identities are the new firewall. Curcio: The biggest fundamental challenge for any organization is to get out of the password business altogether. The more passwords an organization has to manage across all of their users, the higher the likelihood of a critical one being breached.

article thumbnail

Kaseya Breach Underscores Vulnerability of IT Management Tools

eSecurity Planet

Like SolarWinds, both companies serve large B2B audiences, where Kaseya’s products produce hundreds of end products and services. After a series of highly publicized ransomware attacks this spring, the Kaseya attack most resembles the compromise of SolarWinds in late 2020.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Are firewalls configured and maintained to prevent unwanted access and data breaches?

Risk 81
article thumbnail

‘If you wait for government, you’re going to be waiting a long time’: A look at Biden’s cyber funding

SC Magazine

I think at the federal level that’s about all you can really do – you can’t mandate specifics like use this specific access control, or this specific firewall, or this specific email security. It depends whether the company is in the B2C market or in B2B. It’s not a bad thing in the B2B world.