THREATX Blog

Latest THREATX Blog

Follow along for product updates, threat research, and strategies for overcoming the challenges of modern security teams.

Image
  • 27-Jun-2022

How to Use API Schema to Improve API Protection

What Is an API Schema? The RESTful API design pattern is in use by an overwhelming majority of enterprise software projects that rely on machine-to-machine communication. The OpenAPI Standard, now in its third revision–OAS3–defines the functionality built into RESTful APIs, allowing automatic documentation, creation of test cases, and general “discoverability” of API resource specifications and service definitions. Colloquially, this OpenAPI Standard definition is called an API schema. API schemas are critical in microservice mesh architecture, in client-server architecture, and in a great deal of automated tooling and build system automation. They’re also quite useful for adding another layer of security to your APIs. API schemas give you the ability to define the expected usage of API endpoints, and then let you compare that definition to how they are actually being executed. With this information, you can then find the places where expectation and reality don’t match up and make informed decisions on how to respond.

Image
  • 25-May-2022

The Definitive Guide to API Attack Protection

In recent months, we’ve been fielding a lot of questions about API security from our prospects and customers. We know it’s top of mind for many security professionals today, and it’s why we were thrilled to help play a role in creating The Definitive Guide to API Attack Protection. This new book, authored by Crystal Bedell and published by Cyber Edge Press, is your roadmap to understanding APIs and what it takes to protect them. In six easy-to-read chapters filled with illustrations and sidebars, this Definitive Guide answers:

Image
  • 02-Jun-2022

Broken Object Level Authorization

No. 1 on the OWASP Top 10 List of Critical API Security Risks, broken object level authorization or BOLA is both a dangerous and common API security vulnerability. OWASP says of BOLA: “Attackers can exploit API endpoints that are vulnerable to broken object level authorization by manipulating the ID of an object that is sent within the request. This may lead to unauthorized access to sensitive data. This issue is extremely common in API-based applications because the server component usually does not fully track the client’s state, and instead, relies more on parameters like object IDs, that are sent from the client to decide which objects to access.”?

Image
  • 28-May-2022

Spring4Shell: Day 1 Update and Insights

As we reported yesterday, ThreatX deployed to production a ruleset to protect against Spring4Shell exploits. Since then, the ThreatX SOC has been monitoring for hits against the rule. We have seen some matches, though volume has been relatively low.

Image
  • 28-May-2022

Security XChange: John Brunn, CISO

Welcome to ThreatX Security Xchange – our blog series featuring security practitioners and leaders doing the day-to-day hard work of keeping our systems and data safe from cybercriminals. We started this series simply to shine a light on those in the trenches, fighting one of the most important and least understood battles of this generation. We wanted to not only highlight their work, but understand a little more about their pains, priorities, passions, and pet peeves. We hope you enjoy these profiles; let us know if you’d like us to tell your story!

Image
  • 28-May-2022

Demystifying API Security

We hear a lot of questions and concerns from customers and prospects these days about API security. It’s clear from these conversations that organizations are starting to think of API security as a unique, different, novel problem – something that requires new skills and new ways of thinking. With that in mind, I’d like to state a contrarian view here and say: there’s nothing really special about APIs.

© 2021 SRC Cyber Solutions LLP. All Rights Reserved.