Explore tweets tagged as #APIExploitation
@thejulfikar
Muhammad Julfikar Hyder🇵🇸
1 year
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
10
@CloneSystemsInc
Clone Systems
18 days
OAuth tokens found in localStorage during a pentest had access to email files and admin APIs. No encryption no expiration no scope limits.Limit scopes store tokens safely rotate often. #PenTest #AppSec #TokenAbuse #OAuthSecurity #ScopeCreep #APIExploitation
Tweet media one
0
0
1
@WraithVector
WraithVector
2 months
6.¿Te ha pasado alguna vez que encontraste una API vulnerable?.Déjame tu experiencia en los comentarios. 👇.👉 Sígueme para más consejos sobre ciberseguridad, hacking ético y protección de APIs. ¡No dejes tus aplicaciones vulnerables! 💻🔐. #CyberSecurity #APIExploitation.
1
0
0
@TweetThreatNews
Cybersecurity News Everyday
2 months
A recent review revealed severe API documentation vulnerabilities in a leading semiconductor company, increasing risks of exploitation. Public tokens and outdated software pose serious threats to high-tech security. ⚠️ #Semiconductor #APIExploitation. li…
Tweet media one
0
0
1
@FindSecCyber
FindSec 🇨🇦
9 months
🚨 New vulnerabilities in #Azure API Management! Attackers can escalate access to full admin control, posing risks to sensitive data. Ensure your #APIM is secured! . Read More:. #AzureSecurity #APIExploitation #Canada #CanadaCyberAwareness
Tweet media one
0
0
1
@WraithVector
WraithVector
2 months
🎥 En mi canal de YouTube tenéis la parte 1 de hackeo de una API usando un proxy para capturar tráfico. Echadle un ojo👁 y estad atentos a la parte 2. También subiré un video explicando el proceso entero. #CyberSecurity #APIExploitation #PenTesting.
0
0
0
@OtesileOlaoluwa
Otesile Olaoluwa
5 months
Password Reset Abuse.A hacker automates API requests for password reset SMS, forcing a company to pay thousands in SMS costs! 😱💰 Solution? Implement rate limits & spending alerts. #APIExploitation #CyberSecurity.
1
0
0
@francescofaenzi
francescofaenzi
1 year
- #APIExploitation: Manipulating API endpoints that interact with tabular data, exploiting #weak #authentication mechanisms or #inputvalidation to gain #unauthorizedaccess.
1
0
0