What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in APIs

Third-Party APIs: How to Prevent Enumeration Attacks

Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it. When organizations use APIs – the next frontier in cybercrime – to engage with third parties, it’s crucial they understand the associated security exposure they’re introducing. To do so, they must think like a . . . Read more

Doki Backdoor Infiltrates Docker Servers in the Cloud

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.