IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could ...
SANTA CLARA, Calif.--(BUSINESS WIRE)--Cequence Security, a pioneer in API security and bot management, today announced that its CQ Prime Threat Research Team has identified a critical vulnerability ...
SAN FRANCISCO, Oct. 30, 2025 /PRNewswire/ -- Wallarm, the leader in API and AI security, today announced the release of its Q3 2025 API ThreatStats Report, revealing that API-related vulnerabilities ...
Cybersecurity company Snyk Ltd. today announced the launch of Snyk API & Web, a new dynamic application security testing or DAST solution designed to meet the growing demands of modern and ...
Open WebUI carried CVE-2025-64496, a high-severity code injection flaw in Direct Connection features Exploitation could ...
Interconnected technologies are an increasingly necessary part of the trucking industry’s operations. With this rise in technologies comes an increased risk of cyberattacks. The two most prominent ...
Most companies are sitting ducks regarding API security. During my two decades in infosec, I've never seen a threat landscape evolve as rapidly and dangerously as the one surrounding APIs. And here's ...
The popular tool for creating no-code workflows has four critical vulnerabilities, one with the highest score. Admins should ...
API security company Traceable has unveiled its 2023 State of API Security Report. In collaboration with the Ponemon Institute, the study provides a comprehensive global perspective on the state of ...
Australian energy company Jemena has been using APIs, in some form, for about a decade. Its use of APIs — application programming interfaces — has jumped recently and is expected to increase fivefold ...
When security researchers in the past found ways to hijack vehicles' internet-connected systems, their proof-of-concept demonstrations tended to show, thankfully, that hacking cars is hard. Exploits ...
Application programming interfaces (APIs) form the connective tissue in our digital world. Ensuring their security is a top priority for organizations. But in today’s fragmented digital environments, ...