Nieuws

Alex Protocol, a Bitcoin decentralized finance (DeFi) platform on the Stacks blockchain, suffered an exploit on June 6, resulting in $8.3 million in digital asset losses. In an X announcement ...
A report published today by Wallarm finds that of the 639 Common Vulnerabilities and Exposures (CVEs) pertaining to application programming interfaces APIs continue to be one of the weakest links in ...
Docker patched CVE-2025-9074 (CVSS 9.3), a flaw enabling container escape via unauthenticated API, risking host takeover.
Stablecoin payment firm Infini lost $50 million in an exploit suspected to have been conducted by a developer who retained administrative privileges after project delivery.
watchTowr Labs researcher Piotr Bazydlo said the newly uncovered bugs could be fashioned into an exploit chain by bringing together the pre-auth HTML cache poisoning vulnerability with a ...
The escalation of API and AI-related vulnerabilities stresses the need for all industries to be fully aware of such risks and implement comprehensive security measures to protect against evolving and ...
Threat protection: How can attackers exploit your APIs? API security programs must protect against three common attack patterns: denial of service, abuse of functionality and vulnerability exploits.
In summary, an API security program should use both vulnerability scanning and penetration testing to deliver comprehensive security for the API. Both have different approaches and scopes, but ...
Independent security researcher, web designer, and Stanford Computer Science student Feross Aboukhadijeh has developed an attack concept that exploits the fullscreen application programming ...