Remove tags api
article thumbnail

Sending Spammers to Password Purgatory with Microsoft Power Automate and Cloudflare Workers KV

Troy Hunt

I opened-sourced it, took a bunch of PRs, built out the API to present increasingly inane password complexity criteria then left it at that. That page then embeds 2 scripts from the Password Purgatory website, both of which you can find in the open source and public Github repository I created in the original blog post.

Passwords 363
article thumbnail

Fighting API Bots with Cloudflare's Invisible Turnstile

Troy Hunt

There's a "hidden" API on HIBP. To understand why it's bad we need to go back in time all the way to when I first launched the API that was intended to be consumed programmatically by other people's services. So, 2 APIs with 2 different purposes. And it did - it stopped it dead. in just 5 minutes.

Firewall 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Application Security for builders and creators

Security Boulevard

Having read my blog on DevSecOps with GitHub , Claire suggests the team to integrate ShiftLeft NG SAST with their GitHub repo’s workflow from the start. She decides to customize the default analyze command used by ShiftLeft by adding some custom tags. These tags can be any key-value pairs and are completely optional. stage=poc

article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

We can't add a meta tag. Let me illustrate by example: in January this year, I loaded a rather large breach into HIBP: New scraped data: Twitter had over 200M accounts scraped from a vulnerable API in 2021. Hey, wouldn't it be great to have an API around that so you could just automate the entire thing?

article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

One notorious hacking group from Iran uses particularly dirty schemes to fleece users, according to Google's Threat Analysis Group (TAG). According to Google’s TAG blog, APT35 have been active since at least 2017, including attacks on the 2020 U.S. Read Google's official TAG blog to learn more about the technical details.

article thumbnail

GUEST ESSAY: JPMorgan’s $200 million in fines stems from all-too-common compliance failures

The Last Watchdog

While the price tag of these violations was shocking, the compliance failure was not. According to a SEC release , hefty fines brought against JPMorgan, and its subsidiaries were based on “widespread and longstanding failures by the firm and its employees to maintain and preserve written communications”.

Mobile 254
article thumbnail

HYAS Product Enhancements – Part 1 – February 2024

Security Boulevard

But there are common threads across the products in the areas of automated verdicts on IPs and domains, self-serviceable single sign-on capabilities, and many of our API endpoints that help senior security leaders remove silos between teams, improve communication, and reduce costs. You can group by malware family, malware tags, and C2 ASNs.

DNS 49