VRB News
Virtual Reality Brisbane
  • Home
  • About us
  • IT news
  • Tech
  • World
  • Contact
No Result
View All Result
  • Home
  • About us
  • IT news
  • Tech
  • World
  • Contact
No Result
View All Result
No Result
View All Result
Home IT news

API tricks move into the security focus

admin by admin
July 7, 2021
in IT news
0
API tricks move into the security focus
0
SHARES
21
VIEWS
Share on FacebookShare on Twitter

Trouble with interfaces API tricks move into the security focus

Intercepting traffic via APIs, identifying backend servers and business logic, and then working out potential gaps to attack: Hackers are increasingly working with bots, and a report by Barracuda suggests a professionalization of cybercriminals.

Companies on the topic

Around APIs, savvy hackers have some tricks in store.Around APIs, savvy hackers have some tricks in store.

(Picture: ra2 studio – stock.adobe.com)

Most apps are developed “API-first” these days. Putting the interfaces in the foreground usually leads to the fact that it can be “released” faster, practice shows. Another app trend is single page applications, i.e. apps that consist of a single HTML document and whose content is dynamically loaded. They are designed for mobile browsers and only simulate mobile apps without the need to install one.

Where is the business logic?

Tushar Richabadas, Product Marketing Manager, Application Security at Barracuda Networks, highlights the differences: “In a web application, the browser is an intermediary. He speaks to the application, and the latter performs certain actions based on the user’s request and responds to him through the browser. All the business logic is hidden in the application, and most of the attacks are known.”In the API-based application, data is queried via the API and then the business logic is executed on the end-client device based on this,” says Richabadas.

When someone intercepts the API traffic, they can identify the backend server, figure out the logic and perform various checks to identify vulnerabilities and attack the system.

Data theft

APIs thus allow direct access to a lot of sensitive information. “Your bank API can provide access to sensitive private data, and an insufficiently protected API allows attackers to retrieve this information en masse,” says the security specialist. Cybercriminals are literally looking for open APIs. Very often you see companies that expose their test APIs with access to production data on the Internet. Once cybercriminals have discovered them, this can cause great damage, warns the manager.

Finding vulnerabilities

Another problem is APIs that are insufficiently protected. It is relatively easy to test APIs, for example to see if they enforce a rating limit, explains Richabadas and advises IT security teams to first follow the OWASP (Open Web Application Security Project) top 10 recommendations on API Security of the ten most frequently exploited vulnerabilities to strengthen their defense. In this context, he recalls the massive data leaks, such as the vulnerability discovered in 2019 at T-Mobile.

A multi-layered defense with protections against bot, API and supply chain attacks is the best way to respond to these accumulating attacks.

Report by Barracuda

In his paper “The state of application security in 2021”, Barracuda took a closer look at application security. On average, more than two-thirds (72 %) of respondents were attacked at least once in the last twelve months. At 44 percent, bot attacks have overtaken traditional attacks via zero-day vulnerabilities and the top 10 vulnerabilities of the Open Web Application Security Project and have now become the most common attack vector.

The report shows that organizations are often attacked through their web applications. Almost half of the respondents, 46 percent, suffered a security breach several times and another 26 percent at least once. In addition to the frequency of attacks, Richabadas surprised the result of the survey that bot attacks seem to be increasingly difficult to repel in practice.

(ID: 47495401)

Previous Post

The question is not if, but how!

Next Post

Observability in hybrid Multi-clouds

admin

admin

Related Posts

How to Grow a YouTube Channel with ScaleLab
IT news

How to Grow a YouTube Channel with ScaleLab: Effective Strategies for Creators

February 4, 2025
Sticker mockups
IT news

Sticker mockups: how to visualize your ideas professionally and efficiently

January 13, 2025
Ways to Get Free Senegal Proxies for Work and Surfing
IT news

Ways to Get Free Senegal Proxies for Work and Surfing

December 24, 2024
Crypto Betting Frontiers
IT news

Crypto Betting Frontiers: The 2025 Landscape

December 6, 2024
iGaming Marketing Trends for 2025
IT news

iGaming Marketing Trends for 2025: Adapting to a Rapidly Changing Landscape

December 5, 2024
Next Post
Observability in hybrid Multi-clouds

Observability in hybrid Multi-clouds

Premium Content

E3 2020 cancelled due to problems with the coronavirus

E3 2020 cancelled due to problems with the coronavirus

August 19, 2020
Polybius, the psychedelic shooter starts on April 28 on PSVR

Polybius, the psychedelic shooter starts on April 28 on PSVR

April 5, 2022
Announced Blunt Force, an adventure based on the WWII

Announced Blunt Force, an adventure based on the WWII

May 25, 2022

Browse by Category

  • Games
  • IT news
  • Tech
  • World

VRB News is ready to cooperate with webmasters and content creators. Send an email to info@virtualrealitybrisbane.com

Categories

  • Games
  • IT news
  • Tech
  • World

Recent Posts

  • How to Grow a YouTube Channel with ScaleLab: Effective Strategies for Creators
  • Sticker mockups: how to visualize your ideas professionally and efficiently
  • Ways to Get Free Senegal Proxies for Work and Surfing

© 2023 - The project has been developed ServReality

No Result
View All Result
  • Home
  • About us
  • IT news
  • Tech
  • World
  • Contact

© 2023 - The project has been developed ServReality

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?