Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How a Real Crypto API Exploit Let Users Change Asset Types #CryptoSecurity #CryptoExchange #crypto

A real-world API vulnerability let a user change the asset type in a major crypto exchange—bypassing expected controls. Watch how a simple tweak to API parameters enabled unauthorized trades and exposed critical flaws. Learn why detailed schema validation and input checks are essential for protecting sensitive financial APIs.

Shadow APIs: The Blind Spot Putting Your Security at Risk #ShadowAPIs #APIDiscovery #devsecops

Shadow APIs those undocumented, forgotten, or hidden endpoints are one of today’s biggest cybersecurity risks. If you don’t know what APIs you have, you can’t protect them. Wallarm and Oracle experts explain why a complete and up-to-date API inventory is the foundation of modern security, and how missing even a single API can open the door for attackers.

How AI Makes APIs Even More Dangerous #apirisks #aisecurity #airisks #ai

AI and agent-based technologies are accelerating the use—and the risk—of APIs. Experts from Wallarm and Oracle explain how every new AI app or agent can instantly connect to dozens of APIs, multiplying your attack surface. Learn why the combination of AI and APIs is creating new security challenges you can't ignore.

Why Are APIs Easier to Attack Than Apps?#apiattacks #apisecurity #pentest #nist

Discover why over 70% of application attacks now target APIs instead of web apps. Learn from Wallarm and Oracle experts how automation, low entry barriers, and the rapid growth of APIs have changed the security landscape—and what you need to know to protect your organization.

ToolShell: Remote Code Execution in Microsoft SharePoint (CVE-2025-53770)

On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed, impacting on-premises Microsoft SharePoint Server installations. This vulnerability allows unauthenticated attackers to execute arbitrary code remotely by leveraging insecure deserialization techniques.

Mastering API Security Testing: Stop BOLA and the OWASP Top 10 Before Deployment

APIs drive modern applications, but their increasing complexity leaves them vulnerable to attacks. How can you ensure robust API security? Join Wallarm’s webinar to discover how to tackle today’s toughest API security challenges with advanced API security testing strategies. In this webinar we will cover: Learn how Wallarm’s innovative solutions can help you identify vulnerabilities, implement reliable security measures, and streamline your API testing process. Gain actionable insights into tools, best practices, and strategies to protect your APIs effectively.